General

  • Target

    99636-56-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    c0814736c7aa0692dba17d9bd9943022

  • SHA1

    9119ec6ea1f8329cb923f1deeedf03d1000cab6d

  • SHA256

    2da42f2341886645edb928cdf88a9292b075dfa4332829493f9f44b226f60522

  • SHA512

    bcd9dad4d480b570d48be6f8f8f93e4a6f1cb6310a3bfeaf87fd0c10342a0621d4ac2cb07eebb697c3373c9dd34d8cb1a02ea3f6c3b1f9163f23901231942f48

  • SSDEEP

    3072:VcvFBpCY6pi3I7jLDYoJmJfQcORjdehJ4EASNr:Vcv3kwoJEocQehJ4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@forceddd_lzt

C2

5.182.36.101:31305

Attributes
  • auth_value

    91ffc3d776bc56b5c410d1adf5648512

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99636-56-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections