General

  • Target

    101032-187-0x0000000000400000-0x0000000000460000-memory.dmp

  • Size

    384KB

  • MD5

    a35d75c72aff8115092cb86c48bc2ffc

  • SHA1

    a78693b064372377bb5d63ff8ceaea59d8de59e8

  • SHA256

    91948df3b7216f4d2a430e773da07a927c2ea3d6696cbc68ab75502b72b3d9d2

  • SHA512

    e6fa4781c177b1be9004f2c776c03902379ae65bfdc26688f8d9d8b9968fe0f68fc403e9d9f9ae015a23dac029e1da45e71fd0364b4a670b4fbd9d97ba59a2b3

  • SSDEEP

    6144:GxRs09r3Qg47/AVKA4Q1LV9262XuChEuYNXSuh01UhJRJwL//9JrFdyks88mt9zh:2Z5kIKA4QRV/eAuYAU01UhJRJwL//9J5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@Geralt_Work

C2

84.38.189.24:40966

Attributes
  • auth_value

    b3a5a978ca6c153133c1e3c861610714

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101032-187-0x0000000000400000-0x0000000000460000-memory.dmp
    .exe windows x86


    Headers

    Sections