General

  • Target

    1664-85-0x0000000004AE0000-0x0000000004B24000-memory.dmp

  • Size

    272KB

  • Sample

    230302-jjl5wabh85

  • MD5

    d4c306f940eace0323abd89d9da94e97

  • SHA1

    e4d3593a7c1a80f622749de2a345bd968d1f73dc

  • SHA256

    83634cf2ba365de8158755dd912a1bcd5a1d10ef8a49a6d32cee39e5e67932cf

  • SHA512

    081c4c9f914fd592a9985d1a77f63e738172ff82d4e2ded5eee2b3427e77abcd91fe26c8a457bc91132a0ee207fb9ab0ff5d66d6d0b3a689124a594823c406bf

  • SSDEEP

    3072:N6j4ELN6FY9C7zhf5hwVsmLoQYXJvLc99no40SEBShApnIlJJg6xNn2pU9f2MKT5:N6jidf5hwlLoJvLcPyShSnIdZI

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Targets

    • Target

      1664-85-0x0000000004AE0000-0x0000000004B24000-memory.dmp

    • Size

      272KB

    • MD5

      d4c306f940eace0323abd89d9da94e97

    • SHA1

      e4d3593a7c1a80f622749de2a345bd968d1f73dc

    • SHA256

      83634cf2ba365de8158755dd912a1bcd5a1d10ef8a49a6d32cee39e5e67932cf

    • SHA512

      081c4c9f914fd592a9985d1a77f63e738172ff82d4e2ded5eee2b3427e77abcd91fe26c8a457bc91132a0ee207fb9ab0ff5d66d6d0b3a689124a594823c406bf

    • SSDEEP

      3072:N6j4ELN6FY9C7zhf5hwVsmLoQYXJvLc99no40SEBShApnIlJJg6xNn2pU9f2MKT5:N6jidf5hwlLoJvLcPyShSnIdZI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks