General

  • Target

    4632-146-0x0000000000360000-0x0000000000380000-memory.dmp

  • Size

    128KB

  • MD5

    35f5fbe1ae6de09c61a41a3a25e77474

  • SHA1

    714e405b67333d803e59aa2c5fdd7c6cbd51fb65

  • SHA256

    55d73c300aeaee8acc567154673ead2d294da9686101d9762f6ceb72b0e58673

  • SHA512

    437b44c40c5e600c862c9094e0c3187bbb6028bf8281647d9c6c8b2a3aa3872b44e11fb221a4817189743297167a592989608ac2551711438b79ccd3d26ff5ae

  • SSDEEP

    3072:pcvFBwCYapiAI3nGr9DxM1rCQc2ldDWh84EASNV:pcvOpEDx2r7ccWh84jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

747

C2

78.153.144.6:2510

Attributes
  • auth_value

    842e51893ada92572d9bc2e846237976

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4632-146-0x0000000000360000-0x0000000000380000-memory.dmp
    .exe windows x86


    Headers

    Sections