Analysis

  • max time kernel
    289s
  • max time network
    305s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-09-2023 01:24

General

  • Target

    s0851252.exe

  • Size

    174KB

  • MD5

    800364e9b5a22dd54b005e773d20f9fd

  • SHA1

    afe25a2f64530dcce18f1682817f47a95194139b

  • SHA256

    239a9a3adc4ede5abc22f44577f19196fbc50cfe2ab55dea531a358fa2a69099

  • SHA512

    88a9d24d4e1fa5043b9d1a4c05fb9e51af3db378d3db0d063cf5c0333ba7f49872ac7ee85ea45c675c22c6c00eda0357b311e7de5a094748372fcc5306d9334e

  • SSDEEP

    3072:v2Lq3Tu5I0/swG5OfeTfCEP7EKE0u3lZ5Gg6J48e8h1:OLT5I0/swG447EKE0elGg6+

Malware Config

Extracted

Family

redline

Botnet

bobik

C2

77.91.124.82:19071

Attributes
  • auth_value

    d639522ae3c9dda998264d691a19eb33

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

Processes

  • C:\Users\Admin\AppData\Local\Temp\s0851252.exe
    "C:\Users\Admin\AppData\Local\Temp\s0851252.exe"
    1⤵
      PID:600

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/600-0-0x0000000000E70000-0x0000000000EA0000-memory.dmp

      Filesize

      192KB

    • memory/600-1-0x0000000073680000-0x0000000073D6E000-memory.dmp

      Filesize

      6.9MB

    • memory/600-2-0x0000000005620000-0x0000000005626000-memory.dmp

      Filesize

      24KB

    • memory/600-3-0x0000000005E50000-0x0000000006456000-memory.dmp

      Filesize

      6.0MB

    • memory/600-4-0x0000000005990000-0x0000000005A9A000-memory.dmp

      Filesize

      1.0MB

    • memory/600-5-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB

    • memory/600-6-0x00000000058C0000-0x00000000058D2000-memory.dmp

      Filesize

      72KB

    • memory/600-7-0x0000000005920000-0x000000000595E000-memory.dmp

      Filesize

      248KB

    • memory/600-8-0x0000000005AA0000-0x0000000005AEB000-memory.dmp

      Filesize

      300KB

    • memory/600-9-0x0000000073680000-0x0000000073D6E000-memory.dmp

      Filesize

      6.9MB

    • memory/600-10-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB