General

  • Target

    1920-149-0x0000000004920000-0x0000000004964000-memory.dmp

  • Size

    272KB

  • Sample

    230325-plgwtscf56

  • MD5

    2cd18fc0e2385ca7410c1adb98cd931d

  • SHA1

    b2c3cd3c9f313a25f370b3169bf369eadf716f15

  • SHA256

    7b2757fb651820e61a2d1c941214795909967ac5239933d6766e4e06d35ee87a

  • SHA512

    29797357ea9b7be2d94fada91dcd038651a71e896eeb601d6c7111d8f8c8994ac2349dd79fd603ccba8cca301a260124b3d1c9e68e50ed22640efad7e3c3f831

  • SSDEEP

    3072:E6j4ELN6FY9CqZuk6CeakgM+w/TDCegmo40ZThIIhbLnIviPJ13/HxNn2pU9f2Mv:E6jiOZX6CeOM+w//pSqIhvnIvW13

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Targets

    • Target

      1920-149-0x0000000004920000-0x0000000004964000-memory.dmp

    • Size

      272KB

    • MD5

      2cd18fc0e2385ca7410c1adb98cd931d

    • SHA1

      b2c3cd3c9f313a25f370b3169bf369eadf716f15

    • SHA256

      7b2757fb651820e61a2d1c941214795909967ac5239933d6766e4e06d35ee87a

    • SHA512

      29797357ea9b7be2d94fada91dcd038651a71e896eeb601d6c7111d8f8c8994ac2349dd79fd603ccba8cca301a260124b3d1c9e68e50ed22640efad7e3c3f831

    • SSDEEP

      3072:E6j4ELN6FY9CqZuk6CeakgM+w/TDCegmo40ZThIIhbLnIviPJ13/HxNn2pU9f2Mv:E6jiOZX6CeOM+w//pSqIhvnIvW13

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks