General

  • Target

    1544-56-0x0000000001E90000-0x0000000001EBE000-memory.dmp

  • Size

    184KB

  • Sample

    220522-pk4zzaaae5

  • MD5

    7d602386beb1b900cafcc8dc5f1652fe

  • SHA1

    cd82604968d906820bea716891c231cb1a00951e

  • SHA256

    210379042082576148e33d5deddf60e102a219cff3eed8208f14e5a29fee9b3b

  • SHA512

    fec15a753e2ed0fcb241c9be36379c0493d747df0b1bd9d5c91b20309d8f3fe68f5e2167a6f42c23b93b5f1c3072d4e28e946d2afc10221f5f14d3dab212a73b

Malware Config

Extracted

Family

redline

Botnet

Lyla2

C2

185.215.113.201:21921

Attributes
  • auth_value

    f3b96059847b054b3939cadefd4424ee

Targets

    • Target

      1544-56-0x0000000001E90000-0x0000000001EBE000-memory.dmp

    • Size

      184KB

    • MD5

      7d602386beb1b900cafcc8dc5f1652fe

    • SHA1

      cd82604968d906820bea716891c231cb1a00951e

    • SHA256

      210379042082576148e33d5deddf60e102a219cff3eed8208f14e5a29fee9b3b

    • SHA512

      fec15a753e2ed0fcb241c9be36379c0493d747df0b1bd9d5c91b20309d8f3fe68f5e2167a6f42c23b93b5f1c3072d4e28e946d2afc10221f5f14d3dab212a73b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

MITRE ATT&CK Matrix

Tasks