General

  • Target

    3984-118-0x0000000002840000-0x0000000002874000-memory.dmp

  • Size

    208KB

  • Sample

    220524-jw9fyabebl

  • MD5

    87ed5ad7bb2a33d56ab84967fb85fe75

  • SHA1

    335bcf7cdf9fbc7e4080bb131f9279898231efa1

  • SHA256

    7b259fc12e3445e51db45a9e255c670e9b4e93073aca8678db3d2afaa0711d4d

  • SHA512

    04e664f2a8fcc7eb9957994fa05316ed52d08dcd09f04278b700f1d56981cd5622e648ea58025ec1ee41abaa4063dc1ec0a06f304acb9ee564c7feaf8b4bf83e

Malware Config

Extracted

Family

redline

Botnet

redline

C2

193.106.191.225:15304

Attributes
  • auth_value

    7357e43942d666e37ce6cba9e0dcacd9

Targets

    • Target

      3984-118-0x0000000002840000-0x0000000002874000-memory.dmp

    • Size

      208KB

    • MD5

      87ed5ad7bb2a33d56ab84967fb85fe75

    • SHA1

      335bcf7cdf9fbc7e4080bb131f9279898231efa1

    • SHA256

      7b259fc12e3445e51db45a9e255c670e9b4e93073aca8678db3d2afaa0711d4d

    • SHA512

      04e664f2a8fcc7eb9957994fa05316ed52d08dcd09f04278b700f1d56981cd5622e648ea58025ec1ee41abaa4063dc1ec0a06f304acb9ee564c7feaf8b4bf83e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

MITRE ATT&CK Matrix

Tasks