General

  • Target

    1152-66-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    dc77dd130fbcb482a2838e6928b71d5a

  • SHA1

    dad7d8ac138d4ac65f5041c510e9a39516746508

  • SHA256

    64674e2089fa56e7d8db56fe8b62a2936f75e84a8acf47f076cd7e2033d5d669

  • SHA512

    2d76a87cc45bf96af0ef10558e09a781c05841f8bc8a5d9cd3cd1e40e16a86e9cfb4edcac4347f984f4ab628a658253dd3bdbf300dcbfc577a430bce6f93bd82

  • SSDEEP

    3072:lYO/ZMTFNxuI3rG1nK9xIO7lLVhFDFXylX2hXSS:lYMZMBNxuIS4xIORbFAt2h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1709

C2

janolavave.xyz:80

Attributes
  • auth_value

    280cd283869a453d913d671a5d6d4904

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1152-66-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections