General

  • Target

    2780-191-0x0000000000F80000-0x00000000014A2000-memory.dmp

  • Size

    5.1MB

  • MD5

    c0847141675cc3928f3cf19db23dc86d

  • SHA1

    89b3fb2ce75fb201247c69d6972b32ceacbe9357

  • SHA256

    9dc968d583f2d026ee46d35769c6f90f3f1eb9095bae7f17796b80db7d792059

  • SHA512

    c5925361960cd1e65d6b954d8cd05b408e95d51ef1827c02fc6c560ddc55be7e90b767cd2252cf46e64549de51dbf8871ccb341071c41e9fb96ce579363fc274

  • SSDEEP

    98304:Yxh/hwWFzdIttnRB51B/WDEUZfmDogxEF:oSWFzdGRLfqfmDLEF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.10.43.167:26696

Attributes
  • auth_value

    3a70a3e2f548aaf61e05be9e4cadc7c1

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 2780-191-0x0000000000F80000-0x00000000014A2000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections