General

  • Target

    832-96-0x0000000000D00000-0x0000000000D44000-memory.dmp

  • Size

    272KB

  • Sample

    230215-d8e5zahe3z

  • MD5

    a70d097aecec5c31ff76a49c77e152ae

  • SHA1

    2fe6102891aab3edb185ae6ff89af14caec665e7

  • SHA256

    ed8f7d3d8a92408b398583a4792ae80934e3d57161dbd217b15e34e4921c0552

  • SHA512

    8ee4d2867343ed2997ec82d1d84626de4f32f697a6780b1df5e1855ab631c45333691cedb6081afec90246264c7a86d5f51e9d5a41825445c15ad7676dc87db4

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wib:B6jodYx9cYKpzwAAh3nz

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      832-96-0x0000000000D00000-0x0000000000D44000-memory.dmp

    • Size

      272KB

    • MD5

      a70d097aecec5c31ff76a49c77e152ae

    • SHA1

      2fe6102891aab3edb185ae6ff89af14caec665e7

    • SHA256

      ed8f7d3d8a92408b398583a4792ae80934e3d57161dbd217b15e34e4921c0552

    • SHA512

      8ee4d2867343ed2997ec82d1d84626de4f32f697a6780b1df5e1855ab631c45333691cedb6081afec90246264c7a86d5f51e9d5a41825445c15ad7676dc87db4

    • SSDEEP

      3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wib:B6jodYx9cYKpzwAAh3nz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.