Analysis
-
max time kernel
134s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
10-11-2021 15:53
Static task
static1
Behavioral task
behavioral1
Sample
f88b6b23fc39e0e445172415bcb4d293.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
f88b6b23fc39e0e445172415bcb4d293.exe
Resource
win10-en-20211104
General
-
Target
f88b6b23fc39e0e445172415bcb4d293.exe
-
Size
252KB
-
MD5
f88b6b23fc39e0e445172415bcb4d293
-
SHA1
13199416888bbb2c7b6c50310848645f8ac12db6
-
SHA256
059b3496851ba1a92fe8005f9f5d764917895f8ffc4780e3d2721daf377e02e9
-
SHA512
64a5b2f83f368875b70e4eaf6b1ea9ea21dedbf15942e4de9f843de3f7350c6c17f847a87da523686c2bb86a1a5bac6999c3e68c2dce58d09b0f910626266ba4
Malware Config
Extracted
redline
SomeBody
185.215.113.29:36224
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2708-121-0x00000000024F0000-0x000000000250C000-memory.dmp family_redline behavioral2/memory/2708-126-0x0000000004AE0000-0x0000000004AFB000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2708-118-0x0000000002160000-0x0000000002182000-memory.dmpFilesize
136KB
-
memory/2708-119-0x0000000002190000-0x00000000021C0000-memory.dmpFilesize
192KB
-
memory/2708-120-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2708-121-0x00000000024F0000-0x000000000250C000-memory.dmpFilesize
112KB
-
memory/2708-122-0x0000000004B20000-0x0000000004B21000-memory.dmpFilesize
4KB
-
memory/2708-124-0x0000000004B12000-0x0000000004B13000-memory.dmpFilesize
4KB
-
memory/2708-123-0x0000000004B10000-0x0000000004B11000-memory.dmpFilesize
4KB
-
memory/2708-125-0x0000000004B13000-0x0000000004B14000-memory.dmpFilesize
4KB
-
memory/2708-126-0x0000000004AE0000-0x0000000004AFB000-memory.dmpFilesize
108KB
-
memory/2708-127-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/2708-128-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/2708-129-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB
-
memory/2708-130-0x00000000057F0000-0x00000000057F1000-memory.dmpFilesize
4KB
-
memory/2708-131-0x0000000005870000-0x0000000005871000-memory.dmpFilesize
4KB
-
memory/2708-132-0x0000000004B14000-0x0000000004B16000-memory.dmpFilesize
8KB