General

  • Target

    3280-135-0x00000000003E0000-0x0000000000400000-memory.dmp

  • Size

    128KB

  • MD5

    e3bf8c77f789e18c39088afc9b6626da

  • SHA1

    f5ba53cd5604c280d7e33a242ba8751956f648cd

  • SHA256

    5f209007adf2f0304930814cbc3f5f15933d8a0d11d9d01d3266fc67fa356606

  • SHA512

    5c01e327eebcde379734834d174a7c6413dba730e790edce3fd326b1e0543d502790af03a55d2b450d48c7052783b5b9b4556fb82aaa5e67c450357f10e6f97d

  • SSDEEP

    1536:URxtkCr7Q2IxA7cGopi3ftJ8xjsuIiE0aSf4HBTzsaKFKalbuZNoxTrEge0wuei/:XCr7QsU28sHiNf4Hx/EKuR4gehZc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

65.108.5.252:43673

Attributes
  • auth_value

    95517c2a2f56575288c35d9dfde4a6aa

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 3280-135-0x00000000003E0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections