General

  • Target

    900-105-0x0000000006E40000-0x0000000006E84000-memory.dmp

  • Size

    272KB

  • Sample

    230202-back3sfg4x

  • MD5

    efa67214e93dfc12da23eda4c6d32dce

  • SHA1

    bee1268f5c80699b7c436669ca609d0e7c86c835

  • SHA256

    0c577ed379643e51494d329112a473872b9f000b2b1f955fcd1545bdf5e7ad68

  • SHA512

    cfb651bb8c28fbc981818f9d0af124f513c59c7d8ba444de9c5e2f131b9a7b60d663bcefaba609c0b79be35696b5394fcaff0ce63a66c303d567eeaacb5b88ec

  • SSDEEP

    3072:F6jYELp6VFxCjegd9zQRRa0TwOkNwZsmLodSxm4miwo402otLh3An87q3xNn2pUa:F6j+HM9zQPa/5NwpLodSdm2Lhwn87

Malware Config

Extracted

Family

redline

Botnet

milaf

C2

193.233.20.5:4136

Attributes
  • auth_value

    68aaee25afe3d0ae7d4db09dea02347c

Targets

    • Target

      900-105-0x0000000006E40000-0x0000000006E84000-memory.dmp

    • Size

      272KB

    • MD5

      efa67214e93dfc12da23eda4c6d32dce

    • SHA1

      bee1268f5c80699b7c436669ca609d0e7c86c835

    • SHA256

      0c577ed379643e51494d329112a473872b9f000b2b1f955fcd1545bdf5e7ad68

    • SHA512

      cfb651bb8c28fbc981818f9d0af124f513c59c7d8ba444de9c5e2f131b9a7b60d663bcefaba609c0b79be35696b5394fcaff0ce63a66c303d567eeaacb5b88ec

    • SSDEEP

      3072:F6jYELp6VFxCjegd9zQRRa0TwOkNwZsmLodSxm4miwo402otLh3An87q3xNn2pUa:F6j+HM9zQPa/5NwpLodSdm2Lhwn87

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks