General

  • Target

    268-89-0x0000000004B30000-0x0000000004B74000-memory.dmp

  • Size

    272KB

  • Sample

    240303-zfawfafg6z

  • MD5

    630331b1c824f858ae28998cf8035e6c

  • SHA1

    8cff1d49dedb6ce63afcb054c6158adc14d0694a

  • SHA256

    dbedf89c35eb0fdcede1ad6c8313f07b059ad1bcb588682ea1723af2df7c5f6e

  • SHA512

    3836287fc855e04c237ea187e6a9fb2c12934dc6a6ecd8320da8d77ac11b6d4cb52bc8c3791196a0e986571dcfa67a33792c46bb9a3754e379035dab09281c80

  • SSDEEP

    3072:Q6jIELf6FDTCjhnTzO6w/et1WuDCvgxo40TnCch36nycRt7fwxNn2pU9f2MKTV/d:Q6jocuVe3W8Y2chqnycP2s

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Targets

    • Target

      268-89-0x0000000004B30000-0x0000000004B74000-memory.dmp

    • Size

      272KB

    • MD5

      630331b1c824f858ae28998cf8035e6c

    • SHA1

      8cff1d49dedb6ce63afcb054c6158adc14d0694a

    • SHA256

      dbedf89c35eb0fdcede1ad6c8313f07b059ad1bcb588682ea1723af2df7c5f6e

    • SHA512

      3836287fc855e04c237ea187e6a9fb2c12934dc6a6ecd8320da8d77ac11b6d4cb52bc8c3791196a0e986571dcfa67a33792c46bb9a3754e379035dab09281c80

    • SSDEEP

      3072:Q6jIELf6FDTCjhnTzO6w/et1WuDCvgxo40TnCch36nycRt7fwxNn2pU9f2MKTV/d:Q6jocuVe3W8Y2chqnycP2s

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks