General

  • Target

    1424-56-0x00000000023A0000-0x00000000023E4000-memory.dmp

  • Size

    272KB

  • Sample

    240302-n379nsda8v

  • MD5

    2eff9a7eef0f6cb08504bbaa70d49cf2

  • SHA1

    e6b29b8998ed1dd8a7b2f531e4e2efa797c7b92b

  • SHA256

    399024ce6bbe1002dd938474d70ddb38b91eb304077c20ea51dce4e4cdea6a25

  • SHA512

    083740c4b71545d3c15a19d9e44f764e4f28ab2c97d50d7895e785613672eda6e423d21101c09e5021a242360b33c26f9d85c505fac743e303f1ef10a4dfe7b2

  • SSDEEP

    3072:V6jgELP6F6DCnuYFQB+e/ewGsvLS9Eo4012OChcTn1Xz4xNn2pU9f2MKTV/wi4lm:V6jQyYgne1svLSfCh8n1X

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      1424-56-0x00000000023A0000-0x00000000023E4000-memory.dmp

    • Size

      272KB

    • MD5

      2eff9a7eef0f6cb08504bbaa70d49cf2

    • SHA1

      e6b29b8998ed1dd8a7b2f531e4e2efa797c7b92b

    • SHA256

      399024ce6bbe1002dd938474d70ddb38b91eb304077c20ea51dce4e4cdea6a25

    • SHA512

      083740c4b71545d3c15a19d9e44f764e4f28ab2c97d50d7895e785613672eda6e423d21101c09e5021a242360b33c26f9d85c505fac743e303f1ef10a4dfe7b2

    • SSDEEP

      3072:V6jgELP6F6DCnuYFQB+e/ewGsvLS9Eo4012OChcTn1Xz4xNn2pU9f2MKTV/wi4lm:V6jQyYgne1svLSfCh8n1X

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks