General

  • Target

    3480-364-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    db615264f299f1945400470f4f0d8710

  • SHA1

    5949bc2923d9cb064a6f8c5c7845fc09a80d305e

  • SHA256

    9e69bf6f031f8e7ccfd152e67705fa96f2b3250008e2bde6d33d4b21fad77afb

  • SHA512

    ac85b620c019aeb28c295210f4fb327c976845146018a093891882ae9e4af283b15930cce4eafe18b93dc89a60692cf4883fc869927b343ea8b4b09e8344a54e

  • SSDEEP

    1536:FRxtkCrnQ2IEAycGxZ0SFtV8xUyEAOfcHLBWIKzwfbuZuorslF0wuei6tLu:wCrnQANjtyMfcHOWqwlFhzC

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzki28_03

C2

176.122.23.55:11768

Attributes
  • auth_value

    22cdac7fdda98bfe74c28402ce2ddc18

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 3480-364-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Code Sign

    Headers

    Sections