Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
24-10-2021 15:51
Static task
static1
Behavioral task
behavioral1
Sample
69cd6e56d5e35f34a560a73c54a11d39b1e32e8a33c518e58cfe820ebc2f7921.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
69cd6e56d5e35f34a560a73c54a11d39b1e32e8a33c518e58cfe820ebc2f7921.exe
-
Size
410KB
-
MD5
4485f72031dc19ed262a13bce0fdae18
-
SHA1
2406ea5ebfdc28bb3df449261b8cc7ff9fad29bd
-
SHA256
69cd6e56d5e35f34a560a73c54a11d39b1e32e8a33c518e58cfe820ebc2f7921
-
SHA512
52cfbdfab945a5e96dd7fe4744e02a84abfcde6d36a297bf460f9ab9ef607fc470c8dd341f2eef4bc7db15a67f236bd014642a21787363786695fe688489f216
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
UDP
C2
45.9.20.182:52236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3540-118-0x0000000002D80000-0x0000000002D9F000-memory.dmp family_redline behavioral1/memory/3540-123-0x00000000056A0000-0x00000000056BD000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3540-115-0x0000000001281000-0x00000000012A4000-memory.dmpFilesize
140KB
-
memory/3540-116-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/3540-117-0x0000000000400000-0x0000000001037000-memory.dmpFilesize
12.2MB
-
memory/3540-118-0x0000000002D80000-0x0000000002D9F000-memory.dmpFilesize
124KB
-
memory/3540-120-0x00000000057B2000-0x00000000057B3000-memory.dmpFilesize
4KB
-
memory/3540-119-0x00000000057B0000-0x00000000057B1000-memory.dmpFilesize
4KB
-
memory/3540-121-0x00000000057B3000-0x00000000057B4000-memory.dmpFilesize
4KB
-
memory/3540-122-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/3540-123-0x00000000056A0000-0x00000000056BD000-memory.dmpFilesize
116KB
-
memory/3540-124-0x0000000005CC0000-0x0000000005CC1000-memory.dmpFilesize
4KB
-
memory/3540-125-0x0000000005750000-0x0000000005751000-memory.dmpFilesize
4KB
-
memory/3540-126-0x00000000062D0000-0x00000000062D1000-memory.dmpFilesize
4KB
-
memory/3540-127-0x00000000063E0000-0x00000000063E1000-memory.dmpFilesize
4KB
-
memory/3540-128-0x00000000057B4000-0x00000000057B6000-memory.dmpFilesize
8KB
-
memory/3540-129-0x0000000006430000-0x0000000006431000-memory.dmpFilesize
4KB