General

  • Target

    1320-61-0x0000000000090000-0x00000000000B0000-memory.dmp

  • Size

    128KB

  • MD5

    381e13c3425713854b70de022e0fa0b7

  • SHA1

    353391a4056e01ead13abcca7040c6c1ed5c8013

  • SHA256

    fe197eaf08d99643f0808ae3235626045f504767912e26fe5650ee51db656f1b

  • SHA512

    74a8770c219689702e6beb3bf355d8f83d114a67b12bc8b1f5e47442d67990432709fd5a3ea169d466380b3d1e0a67f60dc9bd4037dec00fdc06a4873e919f57

  • SSDEEP

    1536:pRx6kCrDQ2IRADcGFJfHvtB8x3ld4fwH+V5E1n2mbuZgVZBBog0wuei6TLv:PCrDQ05Hald4fwHM8nhJPBFht7

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

10

C2

185.183.32.227:80

Attributes
  • auth_value

    187348b4b0ba6b71d26eaf47eb720dc2

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 1320-61-0x0000000000090000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections