General

  • Target

    1532-155-0x0000000004920000-0x0000000004964000-memory.dmp

  • Size

    272KB

  • Sample

    240302-2ws33aab5y

  • MD5

    dee4152ae247ad764857210a27473544

  • SHA1

    9102656eacfa5a963718733915d1f0e16239b7f4

  • SHA256

    8f4e8fad0100a7c4f9eb5a8b13326f856e125cb3da9ab8fa0e993586441ba0c7

  • SHA512

    d7fcd5818ffe5ba634db1ad90eb6f7a8e90cf4264e7f4440a9af8fb8d329fcc68314d36ba9aeefc9e894c0d7e0634587c5aeb25212974aa612c6562f9a433d9d

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      1532-155-0x0000000004920000-0x0000000004964000-memory.dmp

    • Size

      272KB

    • MD5

      dee4152ae247ad764857210a27473544

    • SHA1

      9102656eacfa5a963718733915d1f0e16239b7f4

    • SHA256

      8f4e8fad0100a7c4f9eb5a8b13326f856e125cb3da9ab8fa0e993586441ba0c7

    • SHA512

      d7fcd5818ffe5ba634db1ad90eb6f7a8e90cf4264e7f4440a9af8fb8d329fcc68314d36ba9aeefc9e894c0d7e0634587c5aeb25212974aa612c6562f9a433d9d

    • SSDEEP

      3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks