General

  • Target

    1480-84-0x0000000000750000-0x0000000000794000-memory.dmp

  • Size

    272KB

  • Sample

    240302-nz2mqada4s

  • MD5

    ca9c90c89201f58039f90e6330a4b944

  • SHA1

    5507677e6846f1f62e09a6db3711decc2d455681

  • SHA256

    96b5d731b021f2ef8dd1714cb13aa69582aa11c8dd2d48fa62633c7155d54c6b

  • SHA512

    a98619e73a7d036bc9b672925cf25f2b884846c80bde94f5cedf71e4c2b838469daaa6600c92e75589b0457fc615ea6cf725c74ab5946bff5e0a657e7b9c3c7c

  • SSDEEP

    3072:V6jgELP6F6DCnuYFQB+e/ewGsvLS9Eo4012OChcTn1Xz4xNn2pU9f2MKTV/wi4lm:V6jQyYgne1svLSfCh8n1X

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      1480-84-0x0000000000750000-0x0000000000794000-memory.dmp

    • Size

      272KB

    • MD5

      ca9c90c89201f58039f90e6330a4b944

    • SHA1

      5507677e6846f1f62e09a6db3711decc2d455681

    • SHA256

      96b5d731b021f2ef8dd1714cb13aa69582aa11c8dd2d48fa62633c7155d54c6b

    • SHA512

      a98619e73a7d036bc9b672925cf25f2b884846c80bde94f5cedf71e4c2b838469daaa6600c92e75589b0457fc615ea6cf725c74ab5946bff5e0a657e7b9c3c7c

    • SSDEEP

      3072:V6jgELP6F6DCnuYFQB+e/ewGsvLS9Eo4012OChcTn1Xz4xNn2pU9f2MKTV/wi4lm:V6jQyYgne1svLSfCh8n1X

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks