General

  • Target

    1020-169-0x0000000004B80000-0x0000000004BB4000-memory.dmp

  • Size

    208KB

  • MD5

    b0f8ee3bf5ad2ef126c3b0406085c455

  • SHA1

    b2fb1162621e180fa6e08a2a876526af74fdf76d

  • SHA256

    d79192949fb69d0e9a2d65f78abbffbc3f9ddbddcaea01f249b19f47c835f0ae

  • SHA512

    a3eedf21de78e50f2ec62dc2feab98791746f257a42462422be66a0f94e85f45c581651cb16efedbcb8d9f8e2e0b46962afcf9c36fe13e058ed6606497a8053b

  • SSDEEP

    3072:0igHULvNqo9viDKl67T7uHqqOlqVqqqqqqq0qqqqqqqqqqqqqVqqqqqqqqqqqqqP:zcUZiml/udcmh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

3

C2

51.89.204.186:36124

Attributes
  • auth_value

    21358de8b6cf817d47956ee1614a9bfc

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 1020-169-0x0000000004B80000-0x0000000004BB4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections