General

  • Target

    2036-56-0x0000000000090000-0x00000000000B0000-memory.dmp

  • Size

    128KB

  • MD5

    477276c6211e2ff5ad43f985f2fcfee2

  • SHA1

    1cd2fe9c192fb11b470f0cf770e029946e9ea9f8

  • SHA256

    9aa9f5b7aea8d4a5d2db657b8462c3387b94a78fc1ce8d210c295b72c4b8249a

  • SHA512

    b82a4453ec2901a57a1c49ec30402f081d19da980293adcf150436d7bd2ea73c7392214dcbe7ab01e610fd49b44bef4b2f5a33f93577f7b30e561079c45ce2df

  • SSDEEP

    3072:3GhlBkCniYz8I/hhL4+lsKk8O5GyDGhFgoaSe:3GhVdM+w8SGhFgvS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Ruzki 3k

C2

194.87.71.5:12857

Attributes
  • auth_value

    a48aca103247e146d387585961a62d1a

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 2036-56-0x0000000000090000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections