General

  • Target

    1968-62-0x0000000000400000-0x000000000041C000-memory.dmp

  • Size

    112KB

  • MD5

    de4dc2a3ac510ba5cdb6350cf54d94c5

  • SHA1

    58851f7b7577d80c0d8658e48522ac3de812a243

  • SHA256

    9be864e4830acea9678bdb63acb3a8ab17ea178e82ab92aa5997b5e5d21e45f8

  • SHA512

    58987235e4ad1484d525d868837474f094f9923b38a324f5172989ee197f07cb3dd819e10336478b4a652ce164d0fb822b2f658046a22616dd26570932aab29d

  • SSDEEP

    1536:BbFrZPEsPfQvzUWYV/J7q4q5pdzfy3d1AsFuypCVPnUSQ93VraYb3ArH+Xoi5bR/:25veYy31CVF23VGIWHri5tyddhzW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6allsupp

C2

jbeaef.ml:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1968-62-0x0000000000400000-0x000000000041C000-memory.dmp
    .exe windows x86


    Headers

    Sections