General

  • Target

    100120-56-0x0000000000400000-0x0000000000460000-memory.dmp

  • Size

    384KB

  • MD5

    02dc1a5ec67921d3a885cd0930edca94

  • SHA1

    3c6f1cc07d18ced6c7be8e2ae99b62c9a961b832

  • SHA256

    43ffe337691cf0a054add683b74d860680d78c5d25733e8acd1878630ed0cab0

  • SHA512

    df3eece2ac1fc2c325eaa962d50981e52e83699cb164807f999706c20f720a70be3b9c24a6e5ddda8885cd8da737ba8bf0714bb4aa27c7ad39c524a24e072d1d

  • SSDEEP

    6144:wqVCpeB+elCGrv9Qr11r7f39GdbQdUDUj8ffrlA/G5oFblenf/7m/lHZvAY0n7A:lblCAunzkWdUDUj8ffrlA/G5oFblenfq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzki13

C2

176.113.115.146:9582

Attributes
  • auth_value

    e58a088bb451fbf3619de77d5856234c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 100120-56-0x0000000000400000-0x0000000000460000-memory.dmp
    .exe windows x86


    Headers

    Sections