General

  • Target

    1896-149-0x0000000000D90000-0x0000000000DD4000-memory.dmp

  • Size

    272KB

  • Sample

    240304-ncjhmagg9s

  • MD5

    8db7dc39356890aa4359d6ba045bf1a2

  • SHA1

    e90b81014fadc2086c718785e0a75b0164d03fd1

  • SHA256

    aefec2c7f59362d953687274394537d3af13baa2034c7af4c871914734b27aa3

  • SHA512

    8a9947c3174d982278620137265349ad8bf240a071d091394e07c4dce02b00a1f118b8afff659d0f6cdbc8c01eeccdd8209372a9a25c1e7422fece6b65dabe44

  • SSDEEP

    3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      1896-149-0x0000000000D90000-0x0000000000DD4000-memory.dmp

    • Size

      272KB

    • MD5

      8db7dc39356890aa4359d6ba045bf1a2

    • SHA1

      e90b81014fadc2086c718785e0a75b0164d03fd1

    • SHA256

      aefec2c7f59362d953687274394537d3af13baa2034c7af4c871914734b27aa3

    • SHA512

      8a9947c3174d982278620137265349ad8bf240a071d091394e07c4dce02b00a1f118b8afff659d0f6cdbc8c01eeccdd8209372a9a25c1e7422fece6b65dabe44

    • SSDEEP

      3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks