General

  • Target

    152456-56-0x0000000000090000-0x00000000000B0000-memory.dmp

  • Size

    128KB

  • MD5

    32543d912cd97984f985c3b7a5ecea53

  • SHA1

    2db920a48ca681945b663a47a4203c3e45c2d3c8

  • SHA256

    950a42a166c6894b9c96282850d7163199061afaee1d23f269f145f921e9bcde

  • SHA512

    3fa6251a892b0dd1a4b10001cc8a5317be7817678c00d8a4af9f862e50ae7f868831f482754cb780d9ad866a50801b3337f48b39b09cb2ca019153bf53dd484a

  • SSDEEP

    3072:HcvFBgCYypivITjSF6XOJN6KQcz5hDihB4EASNm:HcvOE9XOJoDc3ihB4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@forceddd_lzt

C2

5.182.36.101:31305

Attributes
  • auth_value

    91ffc3d776bc56b5c410d1adf5648512

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 152456-56-0x0000000000090000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections