General

  • Target

    1064-154-0x0000000004820000-0x0000000004864000-memory.dmp

  • Size

    272KB

  • Sample

    240302-3rcqysae3s

  • MD5

    5432a4d44ab2ad81a7fd167cbce1a686

  • SHA1

    05c4b786b067bff63e62707d1546ace69889d8c2

  • SHA256

    06b400133bb9e07046e3befc977ef3eec84f2d3aa6267c8bb76fa99e3e3d478a

  • SHA512

    4e7eb4c8801e7febf2581be036794ce1ae01a1eb02321d24c78b897f59b8c54a705de3d82d76bffb29bdf1c74974fda09475d8421dd5eac69edf1803cacf3d06

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      1064-154-0x0000000004820000-0x0000000004864000-memory.dmp

    • Size

      272KB

    • MD5

      5432a4d44ab2ad81a7fd167cbce1a686

    • SHA1

      05c4b786b067bff63e62707d1546ace69889d8c2

    • SHA256

      06b400133bb9e07046e3befc977ef3eec84f2d3aa6267c8bb76fa99e3e3d478a

    • SHA512

      4e7eb4c8801e7febf2581be036794ce1ae01a1eb02321d24c78b897f59b8c54a705de3d82d76bffb29bdf1c74974fda09475d8421dd5eac69edf1803cacf3d06

    • SSDEEP

      3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks