General

  • Target

    976-55-0x00000000021B0000-0x00000000021F4000-memory.dmp

  • Size

    272KB

  • Sample

    230207-lxheyseb21

  • MD5

    fe26a07c8ec5cf558e2a76bcdeeaff81

  • SHA1

    18c11b4a25b42757efceb7b9e907127e3b8c0233

  • SHA256

    a31f4bd7cefb9df46484a7c53c3ec1e411268a901b7490840c3ec11fd52943c1

  • SHA512

    210da4ea186945864aecd4a47be8592cf6a31bc343e77f01fe682c71371e95e12dcaf2c84faf675a93785ce97654677bc7794db3f4001a6030cebfbba9eeca46

  • SSDEEP

    3072:16jIELf6FDTCalB9M41vigXM+wXnMvLH9tho40BEl/hUinBTfTxNn2pU9f2MKTVl:16jo9TxpM+wXnMvLHR/hVnBQ

Malware Config

Extracted

Family

redline

Botnet

roma

C2

193.233.20.7:4131

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Targets

    • Target

      976-55-0x00000000021B0000-0x00000000021F4000-memory.dmp

    • Size

      272KB

    • MD5

      fe26a07c8ec5cf558e2a76bcdeeaff81

    • SHA1

      18c11b4a25b42757efceb7b9e907127e3b8c0233

    • SHA256

      a31f4bd7cefb9df46484a7c53c3ec1e411268a901b7490840c3ec11fd52943c1

    • SHA512

      210da4ea186945864aecd4a47be8592cf6a31bc343e77f01fe682c71371e95e12dcaf2c84faf675a93785ce97654677bc7794db3f4001a6030cebfbba9eeca46

    • SSDEEP

      3072:16jIELf6FDTCalB9M41vigXM+wXnMvLH9tho40BEl/hUinBTfTxNn2pU9f2MKTVl:16jo9TxpM+wXnMvLHR/hVnBQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks