General

  • Target

    5068-309-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    54fe3c1dec97c5e0943b0cafaf699532

  • SHA1

    08389b0311fbb9925974117cfdeb6fb7790c1f90

  • SHA256

    7b39d0685ddb19594de45a4b1bad8917c5f79c2abbb26c3818bd6803459c23a5

  • SHA512

    3dea0b905f604fb7bea42d7588bee62d856d529a75c7cdf8e266cb77fc56786049b692b1c32da98cd1516f377ca15435604bf052f6bdd65921397326415460a5

  • SSDEEP

    1536:Q0DDkCr4G2IEA+cZHwlvNw/3alRy2C/USBxv0vbuTxArAHvdLU:QbCr4GUZl6PavCPG9cH1I

Malware Config

Extracted

Family

redline

Botnet

pizzadlyashekera

C2

65.108.101.231:14648

Attributes
  • auth_value

    7d6b3cb15fc835e113d8c22bd7cfe2b4

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 5068-309-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections