General

  • Target

    796-206-0x0000000000400000-0x0000000000460000-memory.dmp

  • Size

    384KB

  • MD5

    a061a2dcdd9e9f7989f1d112e956bcef

  • SHA1

    98ee7378d7cc9df5bff4da01f0f89cf5de461898

  • SHA256

    0662bbb70f2db39d4bb38c0f26c54af3fad25bc3018e1a8d02c54b17c77a6fe7

  • SHA512

    c5ddf3309bf8ad9a70e0d81d9755f8216dbb08d80ac83dad3a0626633c2f88c35ee6cc161b4b1a0dd62cd95335b83d913428aa93aa6236b486e21732101d7097

  • SSDEEP

    6144:JXf85NG5ML9WSnj2ZB4lyAAi56V7KnCP2kC+9AVsDjl6yglSZiNZmF+OW57MERVk:OqiTOQyAAUi7KCP2kC+9AVsDjl6yglSp

Score
10/10

Malware Config

Extracted

Family

redline

C2

81.161.229.143:27938

Attributes
  • auth_value

    6687e352a0604d495c3851d248ebf06f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 796-206-0x0000000000400000-0x0000000000460000-memory.dmp
    .exe windows x86


    Headers

    Sections