General

  • Target

    1240-139-0x0000000004780000-0x00000000047C4000-memory.dmp

  • Size

    272KB

  • Sample

    240302-zvllgshh53

  • MD5

    9df24c3416fa04b0f2689072c31bf455

  • SHA1

    eb9ac7373ff12141f926f6556f7ba4f0ef961eef

  • SHA256

    dcb3f568d564800797608aa82a810f4d80619c2275a1ff395505547f82a4e246

  • SHA512

    316d144d5648e2f16c29e96ba3b12311060f466550577c2485aa06681e3988d45bc9544ae6e051431a08bc55cf708529324f7b06d1028f930438d63681321988

  • SSDEEP

    3072:J6j4ELN6FY9Cff3n0sk+wziR/o40DrNwAhFMnImax8EExNn2pU9f2MKTV/wi4lrO:J6jiD30sk+wzYZAhunI7x8

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      1240-139-0x0000000004780000-0x00000000047C4000-memory.dmp

    • Size

      272KB

    • MD5

      9df24c3416fa04b0f2689072c31bf455

    • SHA1

      eb9ac7373ff12141f926f6556f7ba4f0ef961eef

    • SHA256

      dcb3f568d564800797608aa82a810f4d80619c2275a1ff395505547f82a4e246

    • SHA512

      316d144d5648e2f16c29e96ba3b12311060f466550577c2485aa06681e3988d45bc9544ae6e051431a08bc55cf708529324f7b06d1028f930438d63681321988

    • SSDEEP

      3072:J6j4ELN6FY9Cff3n0sk+wziR/o40DrNwAhFMnImax8EExNn2pU9f2MKTV/wi4lrO:J6jiD30sk+wzYZAhunI7x8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks