General

  • Target

    1176-70-0x00000000023C0000-0x0000000002404000-memory.dmp

  • Size

    272KB

  • Sample

    230214-rxea7ade3w

  • MD5

    e3385d5d684c5be3a17086c4888f848f

  • SHA1

    85af8b78f02e20ca039fba59672a8aa61a0640f8

  • SHA256

    abbbb9ac0999b6d68fb8ed72cf7b61921d8d7b689e27d6aa49deb7724c58d159

  • SHA512

    2cfcb199c504310bbc9d50ce8aa40c51143fab8faf446a863c47719730a85c81060bea4d68c3c754451fda47db8c65c570703a11d4b48c9aecad09f71dfe4a82

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      1176-70-0x00000000023C0000-0x0000000002404000-memory.dmp

    • Size

      272KB

    • MD5

      e3385d5d684c5be3a17086c4888f848f

    • SHA1

      85af8b78f02e20ca039fba59672a8aa61a0640f8

    • SHA256

      abbbb9ac0999b6d68fb8ed72cf7b61921d8d7b689e27d6aa49deb7724c58d159

    • SHA512

      2cfcb199c504310bbc9d50ce8aa40c51143fab8faf446a863c47719730a85c81060bea4d68c3c754451fda47db8c65c570703a11d4b48c9aecad09f71dfe4a82

    • SSDEEP

      3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks