General

  • Target

    2284-61-0x0000000004020000-0x0000000004054000-memory.dmp

  • Size

    208KB

  • Sample

    230813-x3fzvsfh6y

  • MD5

    f61729144459c36a12a05422681d1f22

  • SHA1

    b116cc1ab9285fb906e08c6ebffe7a046afb2c71

  • SHA256

    3fa9a487f0ccf9b4558a9efa7f149c239747bb258360379be2182cf8357f48b4

  • SHA512

    c3bd97a73337736fb9076619327df5282eb678c537a54722cbc429835bc8ef4594f242d78c88314b8f7977cab3f8a0bf52061af56fa5553de4a3734ea345ff86

  • SSDEEP

    3072:4eG4mt57f3YInEGK2U/YetUBaVa0b6AyM9w+Zxwak8e8hV:S4mt57gInEG3YetMb6

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

209.250.248.11:33522

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      2284-61-0x0000000004020000-0x0000000004054000-memory.dmp

    • Size

      208KB

    • MD5

      f61729144459c36a12a05422681d1f22

    • SHA1

      b116cc1ab9285fb906e08c6ebffe7a046afb2c71

    • SHA256

      3fa9a487f0ccf9b4558a9efa7f149c239747bb258360379be2182cf8357f48b4

    • SHA512

      c3bd97a73337736fb9076619327df5282eb678c537a54722cbc429835bc8ef4594f242d78c88314b8f7977cab3f8a0bf52061af56fa5553de4a3734ea345ff86

    • SSDEEP

      3072:4eG4mt57f3YInEGK2U/YetUBaVa0b6AyM9w+Zxwak8e8hV:S4mt57gInEG3YetMb6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

MITRE ATT&CK Matrix

Tasks