General

  • Target

    1112-55-0x0000000002180000-0x00000000021C4000-memory.dmp

  • Size

    272KB

  • Sample

    230202-xjzmvsdg27

  • MD5

    ce0eae7be3926e12c32cd95cb737b175

  • SHA1

    d9f72d377bb37a2ff9faf5f9512b42199e04323c

  • SHA256

    364ad506877f4ac4849c345b752099af3527bcc51dabbf1ca0e29e3994d5a9e1

  • SHA512

    9530e71648a8270d036c589259bf1d3ab5f714608810a84fb0131fb065285d1635436f03221f3e6481b321de09f73aa1e223f24c682de74a8c2778e6b0e67ded

  • SSDEEP

    3072:F6jYELp6VFxCjegd9zQRRa0TwOkNwZsmLodSxm4miwo402otLh3An87q3xNn2pUa:F6j+HM9zQPa/5NwpLodSdm2Lhwn87

Malware Config

Extracted

Family

redline

Botnet

milaf

C2

193.233.20.5:4136

Attributes
  • auth_value

    68aaee25afe3d0ae7d4db09dea02347c

Targets

    • Target

      1112-55-0x0000000002180000-0x00000000021C4000-memory.dmp

    • Size

      272KB

    • MD5

      ce0eae7be3926e12c32cd95cb737b175

    • SHA1

      d9f72d377bb37a2ff9faf5f9512b42199e04323c

    • SHA256

      364ad506877f4ac4849c345b752099af3527bcc51dabbf1ca0e29e3994d5a9e1

    • SHA512

      9530e71648a8270d036c589259bf1d3ab5f714608810a84fb0131fb065285d1635436f03221f3e6481b321de09f73aa1e223f24c682de74a8c2778e6b0e67ded

    • SSDEEP

      3072:F6jYELp6VFxCjegd9zQRRa0TwOkNwZsmLodSxm4miwo402otLh3An87q3xNn2pUa:F6j+HM9zQPa/5NwpLodSdm2Lhwn87

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks