General

  • Target

    1932-58-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    946237a76858bc836427a277e76511c3

  • SHA1

    1f8f6e212e05e11bc27344d6583afe6897a5197a

  • SHA256

    503d0fede3645ceea94a1993e789d022d4993e6649d9f776b9a209a2c711b3bb

  • SHA512

    a45623318e960285ad9d21632a2e70186009f9b056175ed97606a98cfa4671ef2d5c17b50bbaf2a72f976c50b1b5fc790aed0f2d3dc1a5a8359874a67eb54c5e

  • SSDEEP

    3072:EcvFBoCYPpiIIdYxZ6d92xmQcSSSTRhv4EASN:Ecv2OJd9c/ciRhv4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nam6.1

C2

103.89.90.61:34589

Attributes
  • auth_value

    5a3c8b8880f6d03e2acaaa0ba12776e3

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1932-58-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections