General

  • Target

    1632-58-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    46954cb25dfb9fb12dcd99f9da868736

  • SHA1

    c8f59f20f63f5db69312cdff8d07b81b4fe297e4

  • SHA256

    abf6956374baa0fff26788a6476692bc45445e3e6c95ba2c157e958d6cf96daf

  • SHA512

    9c482b1e1883bcaf803cff3bdad33a06b7ae33302631519bb2d01f35f3e9148fe7a2a47343b93939fc52c548d0f3d7926973a5a48fedd0ef7437d14806dc935e

  • SSDEEP

    1536:qRxakCr5Q2IlAJcGXh4SQtr8x+r9CInE+nf8Hd+uVbuZNoxxrEAi0wuei6tL/:iCr5QKT8LRCQ1f8Hd+634Aihrr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ansdvsvsvd

C2

46.8.220.88:65531

Attributes
  • auth_value

    d7b874c6650abbcb219b4f56f4676fee

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 1632-58-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections