Analysis
-
max time kernel
131s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 01:11
Behavioral task
behavioral1
Sample
0x00060000000153c6-107.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0x00060000000153c6-107.exe
Resource
win10v2004-20240226-en
General
-
Target
0x00060000000153c6-107.exe
-
Size
173KB
-
MD5
7d490385bf555ef1e3eedeef7cfd15ca
-
SHA1
456299cbef2fa6ea6ab470dd0b5866488df9ba4c
-
SHA256
bb3640eac07bafebdff546944cce676a8c8440745a8c1d8de1266f7c03ce875c
-
SHA512
62e64571b0494f9815f1c65798141117576291b23f22e064509e1de7868d5c41d92b3e0dec8793122a96e0d459e902e509e007d3a17f9684c710a99f999eb87a
-
SSDEEP
3072:crbYm66HKzLSFYuxN4eCeWC/qUq8e8hh:ObYn/SelW/qUq
Malware Config
Extracted
redline
dast
83.97.73.129:19068
-
auth_value
17d71bf1a3f93284f5848e00b0dd8222
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2156-0-0x0000000000FA0000-0x0000000000FD0000-memory.dmp family_redline
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2156-0-0x0000000000FA0000-0x0000000000FD0000-memory.dmpFilesize
192KB
-
memory/2156-2-0x00000000748C0000-0x0000000074FAE000-memory.dmpFilesize
6.9MB
-
memory/2156-1-0x0000000000460000-0x0000000000466000-memory.dmpFilesize
24KB
-
memory/2156-3-0x00000000049B0000-0x00000000049F0000-memory.dmpFilesize
256KB
-
memory/2156-4-0x00000000748C0000-0x0000000074FAE000-memory.dmpFilesize
6.9MB
-
memory/2156-5-0x00000000049B0000-0x00000000049F0000-memory.dmpFilesize
256KB