General

  • Target

    272-150-0x00000000046C0000-0x0000000004704000-memory.dmp

  • Size

    272KB

  • Sample

    230328-jszgkabe4y

  • MD5

    a8fec8d36a5219ef82aa11fbdbbd789c

  • SHA1

    90bd5aaea57e29ad6d9bfdd455debe16998553ec

  • SHA256

    1f72828150f67ab3b2ac79ea3faa50cb5a8806e47f27bd346bc3b05fb2a55613

  • SHA512

    ecbbf58d6c9680237c18b9e9b0af67ce42e64e377ab8cb908197a46666dee6f181a9eaef2d754ff035ddb80f3fa99152ca9de111471f978ad56f3a25d9abcb84

  • SSDEEP

    3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MKR:/z6jU1KyZtwLe2EvLcSJ8hinSVJBg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      272-150-0x00000000046C0000-0x0000000004704000-memory.dmp

    • Size

      272KB

    • MD5

      a8fec8d36a5219ef82aa11fbdbbd789c

    • SHA1

      90bd5aaea57e29ad6d9bfdd455debe16998553ec

    • SHA256

      1f72828150f67ab3b2ac79ea3faa50cb5a8806e47f27bd346bc3b05fb2a55613

    • SHA512

      ecbbf58d6c9680237c18b9e9b0af67ce42e64e377ab8cb908197a46666dee6f181a9eaef2d754ff035ddb80f3fa99152ca9de111471f978ad56f3a25d9abcb84

    • SSDEEP

      3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MKR:/z6jU1KyZtwLe2EvLcSJ8hinSVJBg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks