General

  • Target

    99656-56-0x0000000000400000-0x0000000000460000-memory.dmp

  • Size

    384KB

  • MD5

    94cbb6ff6cfbdb55bdaa88918b96a0f5

  • SHA1

    da29e4af9ac499b03d674ca698c089446475c59b

  • SHA256

    a360179c007e793c8a681495a2a7e1060440d1a237ecc6bfe4176dd65f877e3e

  • SHA512

    bf13ef8621863ce33ada441960587940a4b8645011e8ca17119154de416094709d0d7b8235263a03cff8a9877af3789c46858b3ff5e6b1073a31a725624a4ba0

  • SSDEEP

    6144:WKeJ/mcQ4ZJI6hJ6lN4Nmtd/uVjK4ClHrd8lm0gICsUUGP8NeQxVpMFYNI:WscQpEklNWmtd/uVjK4ClHrd8lm0gICH

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@unomaster

C2

5.252.21.34:20081

Attributes
  • auth_value

    671eb5c9ddebecb1af9f5ca7e6413472

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99656-56-0x0000000000400000-0x0000000000460000-memory.dmp
    .exe windows x86


    Headers

    Sections