Static task
static1
Behavioral task
behavioral1
Sample
75da761b015ffe64c01e191a864fd234393e6687462df33649ea42b97cbe47a4.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
75da761b015ffe64c01e191a864fd234393e6687462df33649ea42b97cbe47a4.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
75da761b015ffe64c01e191a864fd234393e6687462df33649ea42b97cbe47a4.zip
-
Size
46KB
-
MD5
eb04adf83f621a03707c5ebd74ca9ca7
-
SHA1
fb639907a018fbc8c9250533110c3417ca0e2d7c
-
SHA256
375334c5e526ed00b736713f64099069097d362ab7edcfe07311cf0136b46cde
-
SHA512
57a3d0f06c9bfa22aa52a9b66d773a7be0dd4978a96399a52d041a3da51780b1051461a06418c4fefd50f51ef8df10239356d27f3b69eca03cf30c2702fca819
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
@treeline300
C2
45.137.190.170:19896
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/75da761b015ffe64c01e191a864fd234393e6687462df33649ea42b97cbe47a4.exe family_redline -
Redline family
Files
-
75da761b015ffe64c01e191a864fd234393e6687462df33649ea42b97cbe47a4.zip.zip
Password: infected
-
75da761b015ffe64c01e191a864fd234393e6687462df33649ea42b97cbe47a4.exe.exe windows x86