General

  • Target

    25032-63-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    9ec694304c64a7d19d6fe9da6c3036fe

  • SHA1

    68e4b1937f216a8f2e6de4e78ee60e019c46bce2

  • SHA256

    acd734bb0edbfbb6f88195a02c978102cdc72ca074960cfb73fa970c08c46607

  • SHA512

    2a12560c169328091e756e72bf402bacee897a4e72510c6e067afb2208c475562e3889e91c23f722210e508eaf9f3541720effb456cec912ccd0969f6e52a289

  • SSDEEP

    3072:RYO/ZMTF9h9owLZQxD/Sx7ZIVtbDFnORP6hDSS5B:RYMZMB9h9oSQJ/Sx7ZWsp6h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

3kfdf

C2

151.80.89.227:45878

Attributes
  • auth_value

    264dc8416dd328131707421fdd8a449d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 25032-63-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections