Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
21-03-2022 15:24
Behavioral task
behavioral1
Sample
ea943ce8dabd9bc5e87c31a5cb3a8e96a50781e8d0270ee90f643343b65e23b3.exe
Resource
win10v2004-20220310-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
ea943ce8dabd9bc5e87c31a5cb3a8e96a50781e8d0270ee90f643343b65e23b3.exe
-
Size
102KB
-
MD5
aea31b804e5d0526629067b4dc981247
-
SHA1
acb0d581c7545ff01ef994f445af1f7ef9405a6d
-
SHA256
ea943ce8dabd9bc5e87c31a5cb3a8e96a50781e8d0270ee90f643343b65e23b3
-
SHA512
344b6cfdba514a9fa5f504a92362d73c46ba5272841cb9d94685df1addbcc2255dc3d56431f15bfbb0944138e80535e914c8018fe47e282e8b394031b57615fd
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
YT
C2
109.107.187.94:22324
Attributes
-
auth_value
c680644e98eb74faf59b8b87eef85c1b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2752-135-0x0000000000290000-0x00000000002B0000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2752-134-0x0000000074880000-0x0000000075030000-memory.dmpFilesize
7.7MB
-
memory/2752-135-0x0000000000290000-0x00000000002B0000-memory.dmpFilesize
128KB
-
memory/2752-136-0x0000000005270000-0x0000000005888000-memory.dmpFilesize
6.1MB
-
memory/2752-137-0x00000000026D0000-0x00000000026E2000-memory.dmpFilesize
72KB
-
memory/2752-138-0x0000000004D60000-0x0000000004E6A000-memory.dmpFilesize
1.0MB
-
memory/2752-139-0x0000000004C50000-0x0000000005268000-memory.dmpFilesize
6.1MB
-
memory/2752-140-0x0000000004C90000-0x0000000004CCC000-memory.dmpFilesize
240KB