General

  • Target

    988-55-0x0000000004590000-0x00000000045D4000-memory.dmp

  • Size

    272KB

  • Sample

    230201-v3nzcsch2z

  • MD5

    58b094bffae35e07390e5c662bc953c5

  • SHA1

    503bb3098db64f1114269d5be9aff272501141f5

  • SHA256

    e65c41b3fec4649c963be7606dbf84ffd9a93eb5ea70ee4f1d1b6fd20da0faf5

  • SHA512

    007d6c1f29bd9359bb0f86d62d693964514f7e2a52ee4b28542bc87583d659cfa078571b9c7a1101f71f68484a4a454c7f7b68b08af5d06d3f027cde19655604

  • SSDEEP

    3072:K6jYELp6VFxCcOmX9KWePM+wLQDCvgUo40fZ7IWfHhKdnHJEDCxNn2pU9f2MKTVU:K6j+kIILM+wLiYwSaHhQnH

Malware Config

Extracted

Family

redline

Botnet

fredy

C2

62.204.41.170:4132

Attributes
  • auth_value

    880249eef9593d49a1a3cddf57c5cb35

Targets

    • Target

      988-55-0x0000000004590000-0x00000000045D4000-memory.dmp

    • Size

      272KB

    • MD5

      58b094bffae35e07390e5c662bc953c5

    • SHA1

      503bb3098db64f1114269d5be9aff272501141f5

    • SHA256

      e65c41b3fec4649c963be7606dbf84ffd9a93eb5ea70ee4f1d1b6fd20da0faf5

    • SHA512

      007d6c1f29bd9359bb0f86d62d693964514f7e2a52ee4b28542bc87583d659cfa078571b9c7a1101f71f68484a4a454c7f7b68b08af5d06d3f027cde19655604

    • SSDEEP

      3072:K6jYELp6VFxCcOmX9KWePM+wLQDCvgUo40fZ7IWfHhKdnHJEDCxNn2pU9f2MKTVU:K6j+kIILM+wLiYwSaHhQnH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks