General

  • Target

    4936-243-0x0000000007780000-0x00000000077BE000-memory.dmp

  • Size

    248KB

  • Sample

    240302-har44abf89

  • MD5

    3c2fd5ad8de8782cd56b0a6aaa062cc5

  • SHA1

    d1cb1580500181dd323de0fb3249e1535b27e408

  • SHA256

    97bbbc674ce7bf87d86444dda214068db72ab8003bf84ab357cf3c8cb7af2786

  • SHA512

    78c6fb6739ef2e7af6ca9d4857b8f5f8a07a1df5d150e7a737d8c7026bd2cd3401e3ee1ca911a12763f565fb3be2d9636b10b8efd96779071cfb60299ad2366b

  • SSDEEP

    3072:Tj6jAEL16l5lCF5gkhFgSqQM+wFhWmik6o400SamXhfVnuky6+mOxNn2pU9f2MKV:Tj6jCNQgoM+w/WmSYXhtnukn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

01

C2

167.235.133.96:43849

Attributes
  • auth_value

    a158e35a6caac69f2614dc12bb02fdf2

Targets

    • Target

      4936-243-0x0000000007780000-0x00000000077BE000-memory.dmp

    • Size

      248KB

    • MD5

      3c2fd5ad8de8782cd56b0a6aaa062cc5

    • SHA1

      d1cb1580500181dd323de0fb3249e1535b27e408

    • SHA256

      97bbbc674ce7bf87d86444dda214068db72ab8003bf84ab357cf3c8cb7af2786

    • SHA512

      78c6fb6739ef2e7af6ca9d4857b8f5f8a07a1df5d150e7a737d8c7026bd2cd3401e3ee1ca911a12763f565fb3be2d9636b10b8efd96779071cfb60299ad2366b

    • SSDEEP

      3072:Tj6jAEL16l5lCF5gkhFgSqQM+wFhWmik6o400SamXhfVnuky6+mOxNn2pU9f2MKV:Tj6jCNQgoM+w/WmSYXhtnukn

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks