General

  • Target

    1600-149-0x0000000000660000-0x0000000000688000-memory.dmp

  • Size

    160KB

  • MD5

    62bb6cba4ccf8e75f1aa318d5afbfbc4

  • SHA1

    ca34d3f719d6193a88126f4ce483225dd04da1ea

  • SHA256

    cb01f979c0886d5cce4e8f79934247c17f0697a302f1838945b89946073075c9

  • SHA512

    44b798fc049308f843a9484287d534f0e310a37ecab77b16398dbb9aedbba767b28e4a935577db17eb90d14eabe96b368e9897ccba437ccf6d786c6f92b5aada

  • SSDEEP

    3072:aYO/ZMTFHfCR2RAYQDOOuoBryVVNDFAfRPFhBSSY2:aYMZMBHf2YtnoBry12pFh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

sep10as1

C2

185.215.113.122:15386

Attributes
  • auth_value

    e45012eae57b2e57b34752fc802550c3

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1600-149-0x0000000000660000-0x0000000000688000-memory.dmp
    .exe windows x86


    Headers

    Sections