General

  • Target

    2676-168-0x0000000004B70000-0x0000000004BAC000-memory.dmp

  • Size

    240KB

  • Sample

    221129-xz2r6abh2x

  • MD5

    0f9bb6094efece32b0ec405a2498adda

  • SHA1

    7007d46e95bb03f2c11339dae8ebf3423732fe62

  • SHA256

    40d44723905db09c6347f0ae0ae97bb9bb3b53f944058bef451c6d550b6a6837

  • SHA512

    85af8b8a4f96900c4ad3a392c786fb25d03c54b4090ebc5e09c21377cf4e28858dc84bb118c0bf483d4a85a571a84a347cafa707c0bf673ca004a29ed82c96a3

  • SSDEEP

    6144:Jjqj7sFp6klHkBsufLtgywY1jMNdWqDM0Yr+ryDFR1Pp9LThwR:JpFA+PywY1jMNIAYr+ryDFR1HLTa

Malware Config

Extracted

Family

redline

Botnet

NewDef2023

C2

185.106.92.214:2510

Attributes
  • auth_value

    048f34b18865578890538db10b2e9edf

Targets

    • Target

      2676-168-0x0000000004B70000-0x0000000004BAC000-memory.dmp

    • Size

      240KB

    • MD5

      0f9bb6094efece32b0ec405a2498adda

    • SHA1

      7007d46e95bb03f2c11339dae8ebf3423732fe62

    • SHA256

      40d44723905db09c6347f0ae0ae97bb9bb3b53f944058bef451c6d550b6a6837

    • SHA512

      85af8b8a4f96900c4ad3a392c786fb25d03c54b4090ebc5e09c21377cf4e28858dc84bb118c0bf483d4a85a571a84a347cafa707c0bf673ca004a29ed82c96a3

    • SSDEEP

      6144:Jjqj7sFp6klHkBsufLtgywY1jMNdWqDM0Yr+ryDFR1Pp9LThwR:JpFA+PywY1jMNIAYr+ryDFR1HLTa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks