General

  • Target

    940-125-0x0000000000E80000-0x0000000000EC4000-memory.dmp

  • Size

    272KB

  • Sample

    230328-b8xc5sab9y

  • MD5

    6a23878816109fd0f37c1a8aec189ada

  • SHA1

    4e0f533e9b3c17b2c1c9bbc8c50a1abc6962905b

  • SHA256

    4856ed52e2c49ef3608699bc5b5d38e6d471245d5865dd4633fbd67e85ca9fe4

  • SHA512

    6a7fe88e9eb5087721e9fe4aa765510459cb73a6aa9ebeaaeea8a60839939199089cca31d175d316fe646d7d638ca222670675125d9cc67d77bc2372e55e1d3d

  • SSDEEP

    3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      940-125-0x0000000000E80000-0x0000000000EC4000-memory.dmp

    • Size

      272KB

    • MD5

      6a23878816109fd0f37c1a8aec189ada

    • SHA1

      4e0f533e9b3c17b2c1c9bbc8c50a1abc6962905b

    • SHA256

      4856ed52e2c49ef3608699bc5b5d38e6d471245d5865dd4633fbd67e85ca9fe4

    • SHA512

      6a7fe88e9eb5087721e9fe4aa765510459cb73a6aa9ebeaaeea8a60839939199089cca31d175d316fe646d7d638ca222670675125d9cc67d77bc2372e55e1d3d

    • SSDEEP

      3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks