General

  • Target

    4588-343-0x0000000000370000-0x0000000000390000-memory.dmp

  • Size

    128KB

  • MD5

    a8b231adbec53d97f514a912325c61ff

  • SHA1

    f0887f4f0ecd13efbe1429e0731cd453deb8cd03

  • SHA256

    3b19b7d93bbf10d21000904c0c2b629e8585b451dd978f8886a85e3c7f02aad5

  • SHA512

    f9b8bbf6710a74d781b6e6876d57ecb562a0eb7f3c2a12628010ac88f8f0512835a3829634dbe6718b8e1e0f7e8ffd946a52df0598c1acd5aba57a82b8b70168

  • SSDEEP

    3072:1cvFBICY5pidITxoXUyLs7DuQcd9jDiha4EASNS:1cv2HpyLs3nc3iha4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nam5

C2

103.89.90.61:34589

Attributes
  • auth_value

    f23be8e9063fe5d0c6fc3ee8e7d565bd

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4588-343-0x0000000000370000-0x0000000000390000-memory.dmp
    .exe windows x86


    Headers

    Sections