General

  • Target

    2344-248-0x0000000000E80000-0x0000000000EA0000-memory.dmp

  • Size

    128KB

  • MD5

    5019c104657c7a3669bb7d75be23f392

  • SHA1

    86dc2934533210d19d69a643080d40642d6827ab

  • SHA256

    c4758850d4d49b72b6111605b55006bec9a46afe3db3bdf951930c594fd51cf0

  • SHA512

    e0042a4aec302018a7af59975b5510d0429ea3f5dd54226cd147edde1e5f384064d0547347c3a7f4f92acd2d0b9c45a628c400c0538999d6bdc2e843ea056a94

  • SSDEEP

    3072:HcvFBgCYCpieID9L27lqeI6QcEhpTFhM4EASNL:HcvOfYlq9zcqFhM4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2344-248-0x0000000000E80000-0x0000000000EA0000-memory.dmp
    .exe windows x86


    Headers

    Sections