General

  • Target

    788-318-0x0000000000F40000-0x0000000001277000-memory.dmp

  • Size

    3.2MB

  • Sample

    220924-b2sflsach2

  • MD5

    b1cdc4e1b3c3f0e2176c68906f37cf9b

  • SHA1

    7b5c58936be53752f35ff2d60f610b7fb38dffff

  • SHA256

    f29b6a224067827dd9ee643933b4375021306ec0fbdb2c96d3b1099c81f15bf3

  • SHA512

    cf6cf7783539f818aaca5d6249765dac4f36683241bcfcad6e927ad448e251b80000bfa0716e3d4dbe718cd52f1a7a1a63ff4b2cc548ab1c873c4de6cc06cfe5

  • SSDEEP

    24576:7+szVTIkKC0p8qZsWq24tityGjvd5cNud1XRaeOx:a6tIt8qZsWq2hBJ5JdC

Malware Config

Extracted

Family

redline

Botnet

newall

C2

deyneyab.xyz:80

Attributes
  • auth_value

    25db96cfa370a37f57d1a769f3900122

Targets

    • Target

      788-318-0x0000000000F40000-0x0000000001277000-memory.dmp

    • Size

      3.2MB

    • MD5

      b1cdc4e1b3c3f0e2176c68906f37cf9b

    • SHA1

      7b5c58936be53752f35ff2d60f610b7fb38dffff

    • SHA256

      f29b6a224067827dd9ee643933b4375021306ec0fbdb2c96d3b1099c81f15bf3

    • SHA512

      cf6cf7783539f818aaca5d6249765dac4f36683241bcfcad6e927ad448e251b80000bfa0716e3d4dbe718cd52f1a7a1a63ff4b2cc548ab1c873c4de6cc06cfe5

    • SSDEEP

      24576:7+szVTIkKC0p8qZsWq24tityGjvd5cNud1XRaeOx:a6tIt8qZsWq2hBJ5JdC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks