General

  • Target

    5612-326-0x0000000000340000-0x0000000000672000-memory.dmp

  • Size

    3.2MB

  • Sample

    220507-vf2xpsfeel

  • MD5

    72bf15144a4b3c84ad5461168c892235

  • SHA1

    73ef1948c275005807e8708639e70a90a84daa67

  • SHA256

    ca1153f660a81e50ceb3d4c6b983be9c217e5ca6148aee0c589c6b5759c70283

  • SHA512

    a3f7aa7fe6b332b11a6f6a528b9cfd3f36375c1460d885b3b93d70a74345170fc31bc1b2a08cbca3a322a510435cc64c98ad507ae1a8786e97b34caa834e37db

Malware Config

Extracted

Family

redline

Botnet

Lyla2

C2

bonezarisor.xyz:80

Attributes
  • auth_value

    de2a98abc502b86b809fbc366af9256a

Targets

    • Target

      5612-326-0x0000000000340000-0x0000000000672000-memory.dmp

    • Size

      3.2MB

    • MD5

      72bf15144a4b3c84ad5461168c892235

    • SHA1

      73ef1948c275005807e8708639e70a90a84daa67

    • SHA256

      ca1153f660a81e50ceb3d4c6b983be9c217e5ca6148aee0c589c6b5759c70283

    • SHA512

      a3f7aa7fe6b332b11a6f6a528b9cfd3f36375c1460d885b3b93d70a74345170fc31bc1b2a08cbca3a322a510435cc64c98ad507ae1a8786e97b34caa834e37db

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks