Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-10-2021 12:05
Static task
static1
Behavioral task
behavioral1
Sample
6365c28ec17de49eb47385aff9e22ce178a691e360cd800eb27d09c540a11fd5.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
6365c28ec17de49eb47385aff9e22ce178a691e360cd800eb27d09c540a11fd5.exe
-
Size
409KB
-
MD5
959868fb6a63eafd661a4a22a2586707
-
SHA1
6391009cf8f5ce5c3daf641db5325390f39d512f
-
SHA256
6365c28ec17de49eb47385aff9e22ce178a691e360cd800eb27d09c540a11fd5
-
SHA512
ead5eaea212244424426553de927758617ce72e0707cad44869503d4d541184fb7b8bc01f378c91f0f4577dc75bccbbaae9e5dd9f079b2174cfd5c896148bddc
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2656-118-0x0000000002E80000-0x0000000002E9F000-memory.dmp family_redline behavioral1/memory/2656-120-0x00000000031C0000-0x00000000031DD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2656-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/2656-117-0x0000000000400000-0x0000000001037000-memory.dmpFilesize
12.2MB
-
memory/2656-118-0x0000000002E80000-0x0000000002E9F000-memory.dmpFilesize
124KB
-
memory/2656-119-0x00000000058B0000-0x00000000058B1000-memory.dmpFilesize
4KB
-
memory/2656-120-0x00000000031C0000-0x00000000031DD000-memory.dmpFilesize
116KB
-
memory/2656-121-0x0000000005DB0000-0x0000000005DB1000-memory.dmpFilesize
4KB
-
memory/2656-122-0x0000000005750000-0x0000000005751000-memory.dmpFilesize
4KB
-
memory/2656-123-0x0000000005780000-0x0000000005781000-memory.dmpFilesize
4KB
-
memory/2656-124-0x00000000058A0000-0x00000000058A1000-memory.dmpFilesize
4KB
-
memory/2656-125-0x00000000058A2000-0x00000000058A3000-memory.dmpFilesize
4KB
-
memory/2656-127-0x00000000058A4000-0x00000000058A6000-memory.dmpFilesize
8KB
-
memory/2656-126-0x00000000058A3000-0x00000000058A4000-memory.dmpFilesize
4KB
-
memory/2656-128-0x00000000063C0000-0x00000000063C1000-memory.dmpFilesize
4KB
-
memory/2656-129-0x0000000006430000-0x0000000006431000-memory.dmpFilesize
4KB