General

  • Target

    78132-181-0x0000000000750000-0x0000000000778000-memory.dmp

  • Size

    160KB

  • MD5

    3ecf6fbf66d09998ceb6b5dac7f7c124

  • SHA1

    ec5f19ba7805ee536f1948eac7311961da4e283f

  • SHA256

    45383368f046a3c244e849de0ec25cabde751715c6b3f072893e9515aaa9043d

  • SHA512

    6e27c9b30e05276d4fbf96d9f9c5b50a86d015c145a92ebba1ecd5bca6ffabe638f4e891920f053d2aa5841725ae1dfc15dc3c7422ac64805ca2b269c4200320

  • SSDEEP

    3072:RYO/ZMTF1JcoA7hZMjlJXN2VLDFqyWPNhCSSb6:RYMZMB1JcoK6jPXNu7mNh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

888888

C2

79.137.192.29:44873

Attributes
  • auth_value

    607a36cfae8c50c53ef92fc3086a32c2

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 78132-181-0x0000000000750000-0x0000000000778000-memory.dmp
    .exe windows x86


    Headers

    Sections