General

  • Target

    116-153-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    74e842a5dfb839357f5c7e3feeadab6e

  • SHA1

    58a4aa7bce32cdb55fa36715c2e409cdd1b5ad6e

  • SHA256

    fd7f33832a0fc7c672e7284ac79ccd1ccd71347ca90b8cd10d6bec42b896b9f3

  • SHA512

    ed5a52d0fed68e29b69d7bff420c171a2406040fcb2333c8a1d1019f6dd21dd1dad83d0b96c996ca994fc9bb7b83908b8223a7cb8e12908466820e42cf12d42c

  • SSDEEP

    3072:OYO/ZMTFFZGIn7+h1M3kLK5E/jnVBDFfyRXRh6SSNL:OYMZMBFZGIaHM3kLK5EDwBRh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

774477

C2

78.153.144.6:2510

Attributes
  • auth_value

    fd79bf75227b0859dc04b729a1c0d21d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 116-153-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections