General

  • Target

    1084-138-0x00000000022F0000-0x0000000002334000-memory.dmp

  • Size

    272KB

  • Sample

    230303-w4tfxaah68

  • MD5

    8d619742530e1df6ee11daa9ce3b5772

  • SHA1

    99da0cb9b79205cd7202694c4fecee6d6c398577

  • SHA256

    44336e11610d17c722da67ed7861bdd5624a66be8a239741e76024780e57e7f3

  • SHA512

    af313b1a761e5b416960a1e7b72818117cb078647ef489d978d8d9a0b6d4e02f0fbecc542f0231dcd9b9a0cffe62ca99fca1ef5c5e99fbb4685ce9dbc961f04f

  • SSDEEP

    3072:Yy6joELH6Vt7CsfMvJq9pGzEM+wCFJDC+glo40jLcKhJqnFLpxNn2pU9f2MKTV/e:Yy6jwbfMvo9pjM+wCFZJsKhYn

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Targets

    • Target

      1084-138-0x00000000022F0000-0x0000000002334000-memory.dmp

    • Size

      272KB

    • MD5

      8d619742530e1df6ee11daa9ce3b5772

    • SHA1

      99da0cb9b79205cd7202694c4fecee6d6c398577

    • SHA256

      44336e11610d17c722da67ed7861bdd5624a66be8a239741e76024780e57e7f3

    • SHA512

      af313b1a761e5b416960a1e7b72818117cb078647ef489d978d8d9a0b6d4e02f0fbecc542f0231dcd9b9a0cffe62ca99fca1ef5c5e99fbb4685ce9dbc961f04f

    • SSDEEP

      3072:Yy6joELH6Vt7CsfMvJq9pGzEM+wCFJDC+glo40jLcKhJqnFLpxNn2pU9f2MKTV/e:Yy6jwbfMvo9pjM+wCFZJsKhYn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks