General

  • Target

    1212-65-0x00000000004A0000-0x00000000004C0000-memory.dmp

  • Size

    128KB

  • MD5

    77b49c81d784041d22770dbfeba1c7a8

  • SHA1

    226bbfa4106903b2abd5258570a50015735470dd

  • SHA256

    c0c4c8b30747f29c680f7ce6dac8440f526cdddcb800ef69a6c2cd44077af2dc

  • SHA512

    e2e3869e577372f911a03eb36012acf708dc19f4f8592e99a478cfc11791980e5465bc222ed21e873d49193cb2aae30e3477d4da4269512733cda5d2ab2b032d

  • SSDEEP

    1536:M/CNDGWtBopjzpW90j5Wd9iIWkjb6baDnjbuMZ0QCWn0wuei6HLtDdi:GC5pBopBDQGI7j2aDnPeTWnhlG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Install

C2

176.10.119.117:27038

Attributes
  • auth_value

    701b6467f584b2d5c52fa31ecce6761d

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 1212-65-0x00000000004A0000-0x00000000004C0000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections