General

  • Target

    1504-155-0x0000000006F60000-0x0000000006FA4000-memory.dmp

  • Size

    272KB

  • Sample

    240303-agf2eaba65

  • MD5

    780ff54cd8c86f9a079ea6b3e05bc0a1

  • SHA1

    6a549776c0b7353b8d07995ce153f08da8cbff99

  • SHA256

    d731db8526e58936d129e060a76adda4993e7fdf3b75b4ddc0843acaf4e4d4eb

  • SHA512

    6a108e243bcb3d49a3d374f1907893c3613d81c596ab063f7634a6988cb25c62700f428deb03369cac14e157f8f9e55dd5ca2a7bc5ea5ebe2e579dcf7d249c73

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MK4:96j+GosvqFwtLo0yr3QhZnIWHm

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      1504-155-0x0000000006F60000-0x0000000006FA4000-memory.dmp

    • Size

      272KB

    • MD5

      780ff54cd8c86f9a079ea6b3e05bc0a1

    • SHA1

      6a549776c0b7353b8d07995ce153f08da8cbff99

    • SHA256

      d731db8526e58936d129e060a76adda4993e7fdf3b75b4ddc0843acaf4e4d4eb

    • SHA512

      6a108e243bcb3d49a3d374f1907893c3613d81c596ab063f7634a6988cb25c62700f428deb03369cac14e157f8f9e55dd5ca2a7bc5ea5ebe2e579dcf7d249c73

    • SSDEEP

      3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MK4:96j+GosvqFwtLo0yr3QhZnIWHm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks