General

  • Target

    1760-84-0x00000000023C0000-0x0000000002404000-memory.dmp

  • Size

    272KB

  • Sample

    240303-kygpdagc2x

  • MD5

    0ea59b9d153ec0b94d0f660e6635dd1c

  • SHA1

    5faa339759b5c5362649743aaa874d4421d7da48

  • SHA256

    710de7f8c0873d83e3fc91c43b82355cf844dfd188f4e4035282b8fee896a856

  • SHA512

    e6380790e1c405131eeaa2efc23d7eb837b45f796dd036d2c20fca33911194e2b1cc02400bc593e31568d00087a51cf4db9e81f83acc572cab650d26d5cf1304

  • SSDEEP

    3072:Z6j4ELN6FY9CLJKymfAwUsmLo0XvqpvtvLn9Fo40n32jThSinnMZSonYBxNn2pUx:Z6jixKymfAwILo0avtvLnc0Thznnto

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Targets

    • Target

      1760-84-0x00000000023C0000-0x0000000002404000-memory.dmp

    • Size

      272KB

    • MD5

      0ea59b9d153ec0b94d0f660e6635dd1c

    • SHA1

      5faa339759b5c5362649743aaa874d4421d7da48

    • SHA256

      710de7f8c0873d83e3fc91c43b82355cf844dfd188f4e4035282b8fee896a856

    • SHA512

      e6380790e1c405131eeaa2efc23d7eb837b45f796dd036d2c20fca33911194e2b1cc02400bc593e31568d00087a51cf4db9e81f83acc572cab650d26d5cf1304

    • SSDEEP

      3072:Z6j4ELN6FY9CLJKymfAwUsmLo0XvqpvtvLn9Fo40n32jThSinnMZSonYBxNn2pUx:Z6jixKymfAwILo0avtvLnc0Thznnto

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks