General

  • Target

    1596-155-0x00000000005E0000-0x0000000000624000-memory.dmp

  • Size

    272KB

  • Sample

    240303-fd5hgsda2z

  • MD5

    00504266dca55d7b076f6690f913b42a

  • SHA1

    e8554653ca1312a04312676d060826be3bc7a050

  • SHA256

    ee40265327cb848ce03c4e50afe145d8f64e305d441f9278f3869ca5da1d44f9

  • SHA512

    18565e503f57b89baf9b672fb1cad656bb477379217ffbc0d521420068a25f5304feee82f58050f911ac4df165b8c4e3bab5b1a9a28a6201ea60d7d16f9b05a0

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKW:96j+GosvqFwtLo0yr3QhZnI

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      1596-155-0x00000000005E0000-0x0000000000624000-memory.dmp

    • Size

      272KB

    • MD5

      00504266dca55d7b076f6690f913b42a

    • SHA1

      e8554653ca1312a04312676d060826be3bc7a050

    • SHA256

      ee40265327cb848ce03c4e50afe145d8f64e305d441f9278f3869ca5da1d44f9

    • SHA512

      18565e503f57b89baf9b672fb1cad656bb477379217ffbc0d521420068a25f5304feee82f58050f911ac4df165b8c4e3bab5b1a9a28a6201ea60d7d16f9b05a0

    • SSDEEP

      3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKW:96j+GosvqFwtLo0yr3QhZnI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks