General

  • Target

    1792-109-0x0000000002140000-0x0000000002184000-memory.dmp

  • Size

    272KB

  • Sample

    230202-ht7nwsfd69

  • MD5

    597fb67199e6ced74d5e3a11a9ceb58a

  • SHA1

    45bab81b9b30b7d708790956ba8529f118bad469

  • SHA256

    812d6cb073504359a14b2c304be6683b5519e700cbe867845734ff3c2e9325fe

  • SHA512

    5f0a32d61af7cbb15c16b458b8e4370827a5b9c3e7d0e04a2de3d275bddf18f11ab6e64b7aa38f709323dedf078f4dcdf76bcbcc1768fad54ee40c45c39703a0

  • SSDEEP

    3072:F6jYELp6VFxCjegd9zQRRa0TwOkNwZsmLodSxm4miwo402otLh3An87q3xNn2pUa:F6j+HM9zQPa/5NwpLodSdm2Lhwn87

Malware Config

Extracted

Family

redline

Botnet

milaf

C2

193.233.20.5:4136

Attributes
  • auth_value

    68aaee25afe3d0ae7d4db09dea02347c

Targets

    • Target

      1792-109-0x0000000002140000-0x0000000002184000-memory.dmp

    • Size

      272KB

    • MD5

      597fb67199e6ced74d5e3a11a9ceb58a

    • SHA1

      45bab81b9b30b7d708790956ba8529f118bad469

    • SHA256

      812d6cb073504359a14b2c304be6683b5519e700cbe867845734ff3c2e9325fe

    • SHA512

      5f0a32d61af7cbb15c16b458b8e4370827a5b9c3e7d0e04a2de3d275bddf18f11ab6e64b7aa38f709323dedf078f4dcdf76bcbcc1768fad54ee40c45c39703a0

    • SSDEEP

      3072:F6jYELp6VFxCjegd9zQRRa0TwOkNwZsmLodSxm4miwo402otLh3An87q3xNn2pUa:F6j+HM9zQPa/5NwpLodSdm2Lhwn87

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks