Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    24-10-2021 14:00

General

  • Target

    351a03aa2ace934ccf22d12c16ebcc0c431198c7c8566c949b1f65923d0a7a46.exe

  • Size

    409KB

  • MD5

    289cc7c862773335eb4b9ce5e00c54ae

  • SHA1

    dc113a9bdd40fc215735800607207524cef6266c

  • SHA256

    351a03aa2ace934ccf22d12c16ebcc0c431198c7c8566c949b1f65923d0a7a46

  • SHA512

    e67cc80a740270a1132b9c0a24cb8bbb0d2761d7a00bc5fec5b3c1a715ce82ee699b9fc9d1da1491d6a107ac31b9000e957dea4ba101ce7d652da37397a5c486

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\351a03aa2ace934ccf22d12c16ebcc0c431198c7c8566c949b1f65923d0a7a46.exe
    "C:\Users\Admin\AppData\Local\Temp\351a03aa2ace934ccf22d12c16ebcc0c431198c7c8566c949b1f65923d0a7a46.exe"
    1⤵
      PID:3712

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3712-116-0x0000000001040000-0x00000000010EE000-memory.dmp
      Filesize

      696KB

    • memory/3712-117-0x0000000000400000-0x0000000001037000-memory.dmp
      Filesize

      12.2MB

    • memory/3712-118-0x0000000002D40000-0x0000000002D5F000-memory.dmp
      Filesize

      124KB

    • memory/3712-120-0x0000000005922000-0x0000000005923000-memory.dmp
      Filesize

      4KB

    • memory/3712-119-0x0000000005920000-0x0000000005921000-memory.dmp
      Filesize

      4KB

    • memory/3712-121-0x0000000005923000-0x0000000005924000-memory.dmp
      Filesize

      4KB

    • memory/3712-122-0x0000000005930000-0x0000000005931000-memory.dmp
      Filesize

      4KB

    • memory/3712-123-0x0000000003140000-0x000000000315D000-memory.dmp
      Filesize

      116KB

    • memory/3712-124-0x0000000005E30000-0x0000000005E31000-memory.dmp
      Filesize

      4KB

    • memory/3712-125-0x0000000003200000-0x0000000003201000-memory.dmp
      Filesize

      4KB

    • memory/3712-126-0x0000000005780000-0x0000000005781000-memory.dmp
      Filesize

      4KB

    • memory/3712-127-0x0000000005890000-0x0000000005891000-memory.dmp
      Filesize

      4KB

    • memory/3712-128-0x0000000005924000-0x0000000005926000-memory.dmp
      Filesize

      8KB

    • memory/3712-129-0x0000000006440000-0x0000000006441000-memory.dmp
      Filesize

      4KB