General

  • Target

    1460-62-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    c00853483a2f30984b0a40d5d0546005

  • SHA1

    99b9d724e923c5fd661ccfd38bd3ca6b7e6cf89d

  • SHA256

    94b318de3324cef93bb55cc102219b9497f869c27e671cc385a771c34d3386ce

  • SHA512

    bd056e389cea75fdbcfcd144247442f925cba231b5c93bede72a087f2417cca0bdb36410d28d3c2c8cf52a9cece067a1bde1687c234811e12bf20820484d1f2e

  • SSDEEP

    3072:jcvFBQCYCpiSIPj/jjJLQfKtQcPjjD9hZ4EASN:jcvO7bJLkK2cr9hZ4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

CaptainJack

C2

212.162.153.217:37364

Attributes
  • auth_value

    80bf8dab5e5add337feb717d8af5035c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1460-62-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections