General

  • Target

    612-63-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    a62fb5c9aa940e23e2689379a9d0f391

  • SHA1

    8fb6fb5715f96598246d2de4ce623ff7cccc8337

  • SHA256

    7beaa73acdc50de07616920bc6930574081b06c1e723da4a4d096a2cb054cb0c

  • SHA512

    63b758b169cc931592212cfbf3b1bc37f5ee802ccef188e51942def546b61f5213ec1f2444589717fc03e9fc7c0c62d1e31c6150256af19a252f531804d21f4f

  • SSDEEP

    3072:QcvFBgCYCpieID9L2QYZ7qUhQczkaGD3hA4EASNA:QcvOfnYZ7V6cK3hA4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

sep6ruzmix

C2

185.215.113.122:15386

Attributes
  • auth_value

    06ba25e2f8de2ebee4bef2351c4555b0

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 612-63-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections