General

  • Target

    1912-55-0x0000000004B30000-0x0000000004B6C000-memory.dmp

  • Size

    240KB

  • MD5

    f5312412d824155e96200c07ee78811d

  • SHA1

    d614dc777f7c63394132b653ec01c477758db8d1

  • SHA256

    8b85ec4b61bd847adbd32f1c256f0c10117b0b13cd59d1a87676fa67563a1510

  • SHA512

    f251e3cb8e217c5d112ac5fa297a745b4414ecc5286b09990042901556b45ca2c2ff8a3957bc257906a48c9df1f1144f7cdff002fb7b1e27907ea9d4aa66bbed

  • SSDEEP

    3072:2jq7LOeZQM9ORvEt7fLehASChJnxpOOgATTw/P7znZllhoe/puXRhTmOSh1P2TM:2jq7P99RfYCh/pO6dRhE

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

20220908

C2

5.45.81.20:16640

Attributes
  • auth_value

    38b3ca0ead7e254eed7e2f9cdcb98e45

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1912-55-0x0000000004B30000-0x0000000004B6C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections