General

  • Target

    764-84-0x0000000001FF0000-0x0000000002034000-memory.dmp

  • Size

    272KB

  • Sample

    240302-r2spdaef24

  • MD5

    3bd1012f0d34156039bdc13707adedd8

  • SHA1

    d185c35d79851c4df5f789838962ea13e9873cdd

  • SHA256

    b6b489cb7ae56a3561f0bc8a5afc73928c0e7969f146ecbc3f1c6b3bb90cc60b

  • SHA512

    4366b31a9fc8afd02445533712b5040d414139f515986c4f4c15d9ed268a5bb8b781e3e959a7a110260f5f6e609c1c7db5cd616549eaaeaeb380e29e9d4d1014

  • SSDEEP

    3072:J6j4ELN6FY9Cff3n0sk+wziR/o40DrNwAhFMnImax8EExNn2pU9f2MKTV/wi4lrO:J6jiD30sk+wzYZAhunI7x8

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      764-84-0x0000000001FF0000-0x0000000002034000-memory.dmp

    • Size

      272KB

    • MD5

      3bd1012f0d34156039bdc13707adedd8

    • SHA1

      d185c35d79851c4df5f789838962ea13e9873cdd

    • SHA256

      b6b489cb7ae56a3561f0bc8a5afc73928c0e7969f146ecbc3f1c6b3bb90cc60b

    • SHA512

      4366b31a9fc8afd02445533712b5040d414139f515986c4f4c15d9ed268a5bb8b781e3e959a7a110260f5f6e609c1c7db5cd616549eaaeaeb380e29e9d4d1014

    • SSDEEP

      3072:J6j4ELN6FY9Cff3n0sk+wziR/o40DrNwAhFMnImax8EExNn2pU9f2MKTV/wi4lrO:J6jiD30sk+wzYZAhunI7x8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks