General

  • Target

    1932-93-0x00000000023E0000-0x0000000002424000-memory.dmp

  • Size

    272KB

  • Sample

    230215-wkwf6adb75

  • MD5

    cfe1acfb26187f5fcb42db1494cbba3d

  • SHA1

    20901d7aac9301a16100a418bab4a3b66c2ad381

  • SHA256

    16a199f5788a45749ca0f3eeaaeb80ea0c1e15f95636fb69c215cbc08f337c3e

  • SHA512

    a034f484f275de37c468a86c40e0862e8edf8eb52555f14b5cd4d72f760b01d97ad18df441f01a3ad244c2f21880061729b996443e2a79dd651b03be0956988a

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      1932-93-0x00000000023E0000-0x0000000002424000-memory.dmp

    • Size

      272KB

    • MD5

      cfe1acfb26187f5fcb42db1494cbba3d

    • SHA1

      20901d7aac9301a16100a418bab4a3b66c2ad381

    • SHA256

      16a199f5788a45749ca0f3eeaaeb80ea0c1e15f95636fb69c215cbc08f337c3e

    • SHA512

      a034f484f275de37c468a86c40e0862e8edf8eb52555f14b5cd4d72f760b01d97ad18df441f01a3ad244c2f21880061729b996443e2a79dd651b03be0956988a

    • SSDEEP

      3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks