General

  • Target

    1760-168-0x0000000002800000-0x000000000283C000-memory.dmp

  • Size

    240KB

  • MD5

    d68a1c680041acfb1344409e7d64085c

  • SHA1

    f966db9b562ea17199926ea1078703fa12eeb19e

  • SHA256

    50bac6739f8a085f7840c7f2c0bc16331a0afd1dd624612fd082931e2984bd7c

  • SHA512

    5ae6537c4a8eca52f7b592a0685204022f949606cd610000cc754e724f24b101ef23b4b719ecde6b032d5b856d4494d995a898d08f9f935e1fa969d24bead4d4

  • SSDEEP

    3072:ojqTLeeJQTGSRPMLL765UQz/14LnypOOgAbJkkw/V5Fwtslxoe/ETM5Lh/TOSTsc:ojqTYGZLLbQL14epOWkfLhc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Test

C2

46.18.107.225:6134

Attributes
  • auth_value

    670d22280e1d18e7a969eb0dd4e2f47c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1760-168-0x0000000002800000-0x000000000283C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections