General

  • Target

    4080-262-0x00000000007C0000-0x00000000007E0000-memory.dmp

  • Size

    128KB

  • MD5

    b435a80d882a91b75f0761ec6188e58a

  • SHA1

    b858f30fbedc084a0621de0f81c742983f40f189

  • SHA256

    647b4bc3594e0fcc8cce41bd9df1b4d0b46acbe4d7298ea488141acac1e37a6c

  • SHA512

    0f4f1e599990eeaa86e57077aabdbe0168d12361e50676c9ed39127b578f2fb020ec2695f364691f5b85e8f55bb7b3737b9353cad699e7704ffcda445bb47709

  • SSDEEP

    3072:fcvFBwCYapiAI3nGr9DxM1rCQc2ldDWh84EASNj:fcvOpEDx2r7ccWh84jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

747

C2

78.153.144.6:2510

Attributes
  • auth_value

    842e51893ada92572d9bc2e846237976

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4080-262-0x00000000007C0000-0x00000000007E0000-memory.dmp
    .exe windows x86


    Headers

    Sections