General

  • Target

    1700-61-0x0000000000090000-0x00000000000B0000-memory.dmp

  • Size

    128KB

  • MD5

    6532a922217c1b47061d496b88dd92ec

  • SHA1

    a572ff7d0d7f093bba585b16d1662b249848ae05

  • SHA256

    531f101c37d5314646cde76b6224232c94d0561292134c46a5f7c0e2fe10f242

  • SHA512

    d686031d83b8db36d7220b7db524a2b1803f20ce65fea5ba92570e74ca12f8456664a8f940569c0917668a7883ff50c2ed38613674dd832a1c3743cded9467c6

  • SSDEEP

    1536:DRxqkCrHQ2IxAvcGFZySXt18x0U/s7MkHUf8Hq1eubuZg8ZUJt0wuei6sLg:xCrHQIpjN+wMoUf8HGtYmJth2k

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

filinnn1

C2

5.45.77.29:41494

Attributes
  • auth_value

    da347df57c88b125ede510dbe7fcc0f4

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 1700-61-0x0000000000090000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Code Sign

    Headers

    Sections