General

  • Target

    99632-56-0x0000000000400000-0x0000000000460000-memory.dmp

  • Size

    384KB

  • MD5

    acc68a2ec59bd75fe5b4f820325e9a8d

  • SHA1

    4c3be9efd748f42252a889ef8100efd86fbe7206

  • SHA256

    4fa24d99cbbf86c8f66cc7dca87b1706ab1533fc0970bcecf175bff051d57d70

  • SHA512

    59f67355e5953219fade679a7dbb45ac78da7e1fb494b44c36e7c9bd0fc020b4b42ac5d385b30222db6d9c098f084d7b9351d9773e7e688f11f6df737d6db0d4

  • SSDEEP

    6144:zeTKH2yWA89pM8p9eimGjS/TD57ZCGLJ/AD5luehWWjEHNPSJdK4O8sQMm17jNlo:zYK8AGveimJFZLt/AD5luehWWjEHNPSe

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ubivca

C2

185.106.92.228:24221

Attributes
  • auth_value

    43ba5caf87c83f17aa82312a2b9ec2de

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99632-56-0x0000000000400000-0x0000000000460000-memory.dmp
    .exe windows x86


    Headers

    Sections