General

  • Target

    2020-56-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    44e2772b3f316f4dcdb5a3f4941980de

  • SHA1

    102f5e5bdf4c82d8d898c3d794bb883f021b44f6

  • SHA256

    cc80ea3f2245f3ebf09de6ee850d557bfb54cda1aba2fa6ccad4e684bd995b29

  • SHA512

    5af1dd6a3122b33fd1c4c79386d8d5eda0135a2d5f8a9e1503303b292f230796a12460c0ebaf195bdb3dc5ed99d48c0fe15982302311184bc6f49bd871487fe8

  • SSDEEP

    3072:4cvFBpCYCpivI7Lj7cyIs7DuQcZzjD8ht4EASNa:4cv3EMyIs3ncl8ht4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@cool_man717

C2

176.31.255.147:41315

Attributes
  • auth_value

    d2ec1c50eaab1c677b88f377ee3162f2

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2020-56-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections