General

  • Target

    1900-80-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    87497dfde6427d6734095b8825ab2cbf

  • SHA1

    f6995b569ce981222f2ef3991cbb989009a8ae1b

  • SHA256

    e3fed27672934854aa896e1af9f687eb1138aadf16dfb971eeb67d7b572e1622

  • SHA512

    3532f6a6a46b38792c7ac9f1c8dfb30fe2f4b76c46f0045146ea21ae670b0bd25c79b418c1b1374f909d82b4b926e8cb1e9ddf877c3132029cc6d7bc19fb2787

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2S3teulgS6p:rAMOY3+zi0ZbYe1g0ujyzd0

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

51.103.25.183:12220

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1900-80-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections