General

  • Target

    4340-133-0x00000000001C0000-0x00000000001E0000-memory.dmp

  • Size

    128KB

  • MD5

    9ea808f8acf66b95f33d317d7fe56fa4

  • SHA1

    b7d19b091d8ae5ea9bbf3616ac743e04f1b0934b

  • SHA256

    19c1d77ca4fe39f624ff8d64bac42f911964387868323d04ad3737122e6fed59

  • SHA512

    78e9b8030512d4e3439d3b04346c7534f2b2a906083d488029651dc47b6c7755857312ac46051121a87f88d57a6ce0e84fe790358ea92fb26e234783ba2863a1

  • SSDEEP

    1536:bRxakCr3Q2IRA/cGB5USktl8xEZbMA8f8HVJn1eFbuZg1Z7J80wuei61LZ:5Cr3Q49edZbMA8f8Hz1SRhJ8hXt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ansdvsvsvd

C2

46.8.220.88:65531

Attributes
  • auth_value

    d7b874c6650abbcb219b4f56f4676fee

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 4340-133-0x00000000001C0000-0x00000000001E0000-memory.dmp
    .exe windows x86


    Headers

    Sections