General

  • Target

    1760-69-0x00000000025F0000-0x0000000002634000-memory.dmp

  • Size

    272KB

  • Sample

    230214-qvlf2sda71

  • MD5

    9a4eca50cfe4c251f1a24719c76bfc38

  • SHA1

    e0928c2e8924b9e1831b7742f6ce8228bcac0dca

  • SHA256

    103c1b127f68c9d6b979b42755c13315622705942fb99b6bba919aa56f6e9263

  • SHA512

    43032b6cb6102d33ae5e6ee7790e77c451e412a6ef4835ceb68023d351710c5af533525355e8cd7dbfb6c1c0013acd9ee1892e7e1b4a971f33ed76734d02ba4b

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      1760-69-0x00000000025F0000-0x0000000002634000-memory.dmp

    • Size

      272KB

    • MD5

      9a4eca50cfe4c251f1a24719c76bfc38

    • SHA1

      e0928c2e8924b9e1831b7742f6ce8228bcac0dca

    • SHA256

      103c1b127f68c9d6b979b42755c13315622705942fb99b6bba919aa56f6e9263

    • SHA512

      43032b6cb6102d33ae5e6ee7790e77c451e412a6ef4835ceb68023d351710c5af533525355e8cd7dbfb6c1c0013acd9ee1892e7e1b4a971f33ed76734d02ba4b

    • SSDEEP

      3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks