Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-10-2021 13:40
Static task
static1
Behavioral task
behavioral1
Sample
74f4bb0c5a7fc7590e0b9b4186aae310ee14717ff2eec29fc87ab136b5464430.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
74f4bb0c5a7fc7590e0b9b4186aae310ee14717ff2eec29fc87ab136b5464430.exe
-
Size
410KB
-
MD5
b112bf755c2af9d054e5083ee9b544ba
-
SHA1
69b75258cc2dd6fbf3ef2752fbce117628fcea99
-
SHA256
74f4bb0c5a7fc7590e0b9b4186aae310ee14717ff2eec29fc87ab136b5464430
-
SHA512
282e33a385cd53aa666c7375963719214ed2f11d48a88a9836aa0fd625092860752df0efb8d7a821ea003134007cc641c168750fbd514239be952d610212df3e
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PUB
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4188-116-0x0000000001520000-0x000000000153F000-memory.dmp family_redline behavioral1/memory/4188-118-0x0000000002FF0000-0x000000000300D000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4188-115-0x00000000012B1000-0x00000000012D4000-memory.dmpFilesize
140KB
-
memory/4188-116-0x0000000001520000-0x000000000153F000-memory.dmpFilesize
124KB
-
memory/4188-117-0x00000000058B0000-0x00000000058B1000-memory.dmpFilesize
4KB
-
memory/4188-118-0x0000000002FF0000-0x000000000300D000-memory.dmpFilesize
116KB
-
memory/4188-119-0x0000000005DB0000-0x0000000005DB1000-memory.dmpFilesize
4KB
-
memory/4188-121-0x0000000000400000-0x0000000001037000-memory.dmpFilesize
12.2MB
-
memory/4188-120-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/4188-123-0x00000000031F0000-0x00000000031F1000-memory.dmpFilesize
4KB
-
memory/4188-122-0x00000000058A0000-0x00000000058A1000-memory.dmpFilesize
4KB
-
memory/4188-125-0x00000000058A3000-0x00000000058A4000-memory.dmpFilesize
4KB
-
memory/4188-124-0x00000000058A2000-0x00000000058A3000-memory.dmpFilesize
4KB
-
memory/4188-126-0x0000000005790000-0x0000000005791000-memory.dmpFilesize
4KB
-
memory/4188-127-0x00000000063C0000-0x00000000063C1000-memory.dmpFilesize
4KB
-
memory/4188-128-0x0000000006430000-0x0000000006431000-memory.dmpFilesize
4KB
-
memory/4188-129-0x00000000058A4000-0x00000000058A6000-memory.dmpFilesize
8KB