Analysis
-
max time kernel
290s -
max time network
307s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2023 01:01
Behavioral task
behavioral1
Sample
2ZI453MP.exe
Resource
win7-20230831-en
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
2ZI453MP.exe
Resource
win10-20230915-en
2 signatures
300 seconds
General
-
Target
2ZI453MP.exe
-
Size
231KB
-
MD5
5cbbf70b11d1f6776addc964c4ceddd7
-
SHA1
9301e9a63d43dbbc0ca1dd5f84912b80e67ce99a
-
SHA256
c83de57c35f4636aa2182a3675132155cd3b757bfb14f57bda270ef0a4249b2a
-
SHA512
d17da9467b5460f6fccd89b2196fa29dbd0004edfc50f66ccc2ac83fc2386e818215ea248a55f40e49ebaec3c6399cc780b4b753ee8f5cc66049b866f3ea10ae
-
SSDEEP
3072:sgspAnCNgcepupXKLh8DjV7OGt/qasDrTv+mIqd44oKG6g:jOACNgceQpXKLKdr/ODrTmmpd44oK
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
gigant
C2
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3712-0-0x0000000000A20000-0x0000000000A5E000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3712-0-0x0000000000A20000-0x0000000000A5E000-memory.dmpFilesize
248KB
-
memory/3712-1-0x0000000073E90000-0x000000007457E000-memory.dmpFilesize
6.9MB
-
memory/3712-2-0x0000000007C30000-0x000000000812E000-memory.dmpFilesize
5.0MB
-
memory/3712-3-0x00000000077D0000-0x0000000007862000-memory.dmpFilesize
584KB
-
memory/3712-4-0x0000000007970000-0x0000000007980000-memory.dmpFilesize
64KB
-
memory/3712-5-0x0000000007780000-0x000000000778A000-memory.dmpFilesize
40KB
-
memory/3712-6-0x0000000008740000-0x0000000008D46000-memory.dmpFilesize
6.0MB
-
memory/3712-7-0x0000000008130000-0x000000000823A000-memory.dmpFilesize
1.0MB
-
memory/3712-8-0x00000000079D0000-0x00000000079E2000-memory.dmpFilesize
72KB
-
memory/3712-9-0x0000000007A30000-0x0000000007A6E000-memory.dmpFilesize
248KB
-
memory/3712-10-0x0000000007A70000-0x0000000007ABB000-memory.dmpFilesize
300KB
-
memory/3712-11-0x0000000073E90000-0x000000007457E000-memory.dmpFilesize
6.9MB
-
memory/3712-12-0x0000000007970000-0x0000000007980000-memory.dmpFilesize
64KB