General

  • Target

    2040-62-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    b93354763fa15a2179c6ea45c697ef37

  • SHA1

    5b551295c2ddc92e96041178eee26660097cf4ae

  • SHA256

    1831f3c423d6237b6fe8898cfe7856d8ae8a1522bcc55cfafa5f69e289cdd1d8

  • SHA512

    549242075845ac7289b95f440b1e5c51bfa76d9421f002d12492def7029308d390f13099b941621e9e94202a809b5dd03f65d552c4e3e34825f929e724555c75

  • SSDEEP

    3072:oGhlBFCnRYz/IzDM0Qm0q+H3MIFedWRhigoaS:oGhUtgmkB5RhigvS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

X

C2

194.127.179.35:35180

Attributes
  • auth_value

    76e43cff05002e5f6e3334fa7946e404

Signatures

  • RedLine Payload 1 IoCs
  • Redline family

Files

  • 2040-62-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections