General

  • Target

    105356-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    a20893f535c512281a608a1d35238c1e

  • SHA1

    eefdd2a7d17aeae3568be793c1fedff3b16bac57

  • SHA256

    6a25fded90764350b9ef9aa3cf81b5c56375700abcc4571eee5055927e80b1bd

  • SHA512

    3d56d7f04193dba77519a8fc34ca0a86a38ec8b0d5aff036983f6e0a8f73c955d14350163acc57781023f0173577658ddb3a08402f3cb86359aa68f3048bac5f

  • SSDEEP

    3072:tYO/ZMTFe14IYzQCZpdWXNnV2DFlyRPch0SSI3:tYMZMBe14IHIpdWdsipch

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@forceddd_lzt

C2

5.182.36.101:31305

Attributes
  • auth_value

    91ffc3d776bc56b5c410d1adf5648512

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 105356-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections