General

  • Target

    1908-88-0x00000000012A0000-0x00000000012C0000-memory.dmp

  • Size

    128KB

  • MD5

    56ef4e7120c9fe78179c76b306ea1559

  • SHA1

    42cc066865dd5ef63906880ed58da43135a36488

  • SHA256

    b7c0caae929869785611a9dc98321a938a31efe549ef80f8f4bff98d4bf7b4c3

  • SHA512

    a47eac4cd3d5ab46ecc827085327cf717592c80342fe0202f52613d0011f524e8f98431a5405bf071b243f834c4e85a17526155f34e453ffcfdfc57aee3510ac

  • SSDEEP

    3072:ccvFBgCYCpieID9L27lqeI6QcEhpTFhM4EASNg:ccvOfYlq9zcqFhM4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1908-88-0x00000000012A0000-0x00000000012C0000-memory.dmp
    .exe windows x86


    Headers

    Sections