General

  • Target

    1356-139-0x0000000003270000-0x00000000032B4000-memory.dmp

  • Size

    272KB

  • Sample

    240303-ajbvgaba69

  • MD5

    a0694f6febeb423aefddaff0f8234b18

  • SHA1

    7953d0f48b748d6d369e46abe04345a3bb6fb92a

  • SHA256

    52ec69eb3f1045ff776942825075bae9921ea7a2e42ea8aedb3762644560aebb

  • SHA512

    76b4c19b6d63adafc17dd43def7bad90d19da8b6ef28bdc0b34e7a84f4f55432d2302092023263a37f3486c699f7380f5c2b10999754a407cc722ddda2f685ca

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      1356-139-0x0000000003270000-0x00000000032B4000-memory.dmp

    • Size

      272KB

    • MD5

      a0694f6febeb423aefddaff0f8234b18

    • SHA1

      7953d0f48b748d6d369e46abe04345a3bb6fb92a

    • SHA256

      52ec69eb3f1045ff776942825075bae9921ea7a2e42ea8aedb3762644560aebb

    • SHA512

      76b4c19b6d63adafc17dd43def7bad90d19da8b6ef28bdc0b34e7a84f4f55432d2302092023263a37f3486c699f7380f5c2b10999754a407cc722ddda2f685ca

    • SSDEEP

      3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks