General

  • Target

    4248-321-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    df4ce58938d665fa3e110f7e6dca56db

  • SHA1

    22b9566e6c101f9466976337f2fb137018b027fe

  • SHA256

    cad99e5ec17cb4924a7c85484403d5f2c8715488621968a0312440b303373055

  • SHA512

    2407353a4222a16b0415fb5e7a671d5bb1731045be1ece3aa770d9fee1f256df74942c7e70a86437ff1a94e2b876c005b759b047812cb96b4c12a0d3cb1186d3

  • SSDEEP

    1536:m0DTkCrnG2IFABcZllnG+TUDIBxiujpIUYi2GzfbuTxhusH74ELR:mrCrnGSGjCIBP20kjH7Z9

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzki12_03

C2

176.122.23.55:11768

Attributes
  • auth_value

    c51ddc8008e8581a01cec6e8291c5530

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 4248-321-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections