General

  • Target

    1448-64-0x0000000000280000-0x00000000002A0000-memory.dmp

  • Size

    128KB

  • MD5

    45776fba0e7012c618d37a47b8cc259d

  • SHA1

    a5101b2a422a8e66d6ea673e803d9035add3a5ed

  • SHA256

    0e07af6d28efb5c7dc0836ff2bdc27eea35184e0cef6a42a07ccf9954ec02ad0

  • SHA512

    45418e0d76d62631c335069bd7a4f351edc0a6f49227ae32071c1b8a2c2fe2758be7f279e12ed7cb830f2c62c00794980bd856c8ec0002eaf149cedfaf11dba5

  • SSDEEP

    1536:KkCpDyWtv5lETpo94j5K4YXsIDlxqDTin8buMZeQsWM0wuei6TLtDdCa:3CNVv5lQBE41Ipx+in0A3WMhBG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

install

C2

31.41.244.92:6188

Attributes
  • auth_value

    eb23a0ca5a38a3bf1eb16b2f08524f35

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 1448-64-0x0000000000280000-0x00000000002A0000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections