General

  • Target

    99188-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    247c2fd6ba347079a6402458d2fcf3ea

  • SHA1

    9e37c91bbd7fd73669495bd8cf6b64351d997e46

  • SHA256

    09afa0e5658a6519cc814f8ad600560de065f035750d71b4d2844363f47f389d

  • SHA512

    162bc071229fdfe10ba296966fa6ac72373567dc30459916c2922fdfbaf6382d9d36bab4e0cfd746b9cb3181f0b0d1bb7afb8f672af5b474bd2dc1ed65b055fd

  • SSDEEP

    3072:SYO/ZMTFfXuIQj/9tfZWAa6RVcDFtyRP8htSSI6Z:SYMZMBfXuIQvfZWAa6Iyp8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzki17

C2

176.113.115.146:9582

Attributes
  • auth_value

    255dbca556006216f06e94f8237bdb0a

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99188-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections