General

  • Target

    144556-56-0x0000000000090000-0x00000000000B0000-memory.dmp

  • Size

    128KB

  • MD5

    c4d68e644a72bc26a23dd7b68bdb85a2

  • SHA1

    85531d9c8f20fcd692d830b4e88e887d2b1f1094

  • SHA256

    adc7d1c17dce4392aa4ebe1c66b2b36adddcd80cd0d2df375d29d1902a107745

  • SHA512

    1cd9080f7744495c926f5548374585e60db76e74af00656e33b2ef64ac0d3c1634ae8fac8be229df570934fd10658e1ae2a071e64c584f466702971b3735e054

  • SSDEEP

    3072:WcvFBwCYdpiIIC8LBZkEEpaRQQcQfjTxhz4EASNS:WcvO8DEpwZcKxhz4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzki9

C2

176.113.115.146:9582

Attributes
  • auth_value

    0bc3fe6153667b0956cb33e6a376b53d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 144556-56-0x0000000000090000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections