General

  • Target

    3924-367-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    14e7b60f9f731c0e2d149e035aec5d89

  • SHA1

    6f66c12e2f5a1c77747756ca76642bb446ee6f25

  • SHA256

    ff6ff2280a18e6514b88d4d94cd1bad2dcd5c093e88927c65572087fbae401b2

  • SHA512

    b96578727e0a1d4b274af2c1d8ae63033d32ef30a05a7de6cc42b445fe0c1b676d529b5be9c33ad478c63c4748fcd9b4fda7ceaa07ae8b804ed11cdca268b35f

  • SSDEEP

    3072:JcvFBgCYdpicIW1HJ8kVLssZFbdnQc55pTnhD4EASNX:Jcv+QPkVLpscNnhD4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

izi

C2

185.106.92.228:24221

Attributes
  • auth_value

    c3bad2493a429e3835d0c80a901cb9eb

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 3924-367-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections