General

  • Target

    4220-137-0x0000000004F10000-0x0000000004F4E000-memory.dmp

  • Size

    248KB

  • Sample

    240304-le54asfa2z

  • MD5

    00f09f0710b96ba93eb3649aae1f6619

  • SHA1

    263b3e59a3931cb8168cd1ed3625ead5501d7237

  • SHA256

    4cc6652a11751dc31c302a69c4978ce55c6e2d0f417fff41f48a8cef784739cb

  • SHA512

    ef8cef676d67db12dccb04d2e35c9eab63d995ed0f0d330f5323b4a99feba2f68e53c06c2e21010bc472f614f8e8e5cdca5761ffb86ba1a0725f8060c53e7035

  • SSDEEP

    3072:C6j1ELs6B3bDCkIopDKmH+Hi0Ji/ep4u0DCjgAo40Jg2Shc+ny6PxG2Z2C9xNn2M:C6jk39IoZKmwLaefGk2ShPny0I

Malware Config

Extracted

Family

redline

Botnet

Build1

C2

185.189.151.109:36839

Attributes
  • auth_value

    d676f4d8230f2d1faff9a183479712d6

Targets

    • Target

      4220-137-0x0000000004F10000-0x0000000004F4E000-memory.dmp

    • Size

      248KB

    • MD5

      00f09f0710b96ba93eb3649aae1f6619

    • SHA1

      263b3e59a3931cb8168cd1ed3625ead5501d7237

    • SHA256

      4cc6652a11751dc31c302a69c4978ce55c6e2d0f417fff41f48a8cef784739cb

    • SHA512

      ef8cef676d67db12dccb04d2e35c9eab63d995ed0f0d330f5323b4a99feba2f68e53c06c2e21010bc472f614f8e8e5cdca5761ffb86ba1a0725f8060c53e7035

    • SSDEEP

      3072:C6j1ELs6B3bDCkIopDKmH+Hi0Ji/ep4u0DCjgAo40Jg2Shc+ny6PxG2Z2C9xNn2M:C6jk39IoZKmwLaefGk2ShPny0I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks