General

  • Target

    616-155-0x00000000048E0000-0x0000000004924000-memory.dmp

  • Size

    272KB

  • Sample

    240302-2sbplsab4t

  • MD5

    2bba17ef6f26ff0fc1064ff593e381b6

  • SHA1

    82cb9f044aafc3838fe0addb142ee7207dcc184f

  • SHA256

    4a5ba8f6c74b591de56268ad42b319f983482c3357cb9f2617e99ac9585e6f52

  • SHA512

    9c5440be9aa6403edbd10b6abfe647ffcd22c20e66ecd6dd7afc188ef8700641908b288814eff91c66afe10f384063e5eeac4a9e1046a67307ea504e6c234bea

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      616-155-0x00000000048E0000-0x0000000004924000-memory.dmp

    • Size

      272KB

    • MD5

      2bba17ef6f26ff0fc1064ff593e381b6

    • SHA1

      82cb9f044aafc3838fe0addb142ee7207dcc184f

    • SHA256

      4a5ba8f6c74b591de56268ad42b319f983482c3357cb9f2617e99ac9585e6f52

    • SHA512

      9c5440be9aa6403edbd10b6abfe647ffcd22c20e66ecd6dd7afc188ef8700641908b288814eff91c66afe10f384063e5eeac4a9e1046a67307ea504e6c234bea

    • SSDEEP

      3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks