General

  • Target

    1912-55-0x0000000002060000-0x0000000002094000-memory.dmp

  • Size

    208KB

  • MD5

    a234ef299d7e383f79aacc1f6f7b7079

  • SHA1

    9ebc8fd341dee59984921be5988760e043a68941

  • SHA256

    a0f4628b413d1c0c762072ca4350ebc25efd5633d6af21b7b287400013172b52

  • SHA512

    dac10603a98278f8dd4699972bd8e70d24e6759e6ac6191bf0ce1b9c5ec40c7656fe679b10ca78be096dcd2a32e263b9843247a10112d09b6a20437b11dfcf5a

  • SSDEEP

    3072:vWgHUUvDReFg+BksPQBp4aanI5R20YsBUBhN7cdqr:ecUeCHE4PnIQBhx0

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

787

C2

linevanarsor.xyz:80

Attributes
  • auth_value

    25cd5ed9d70109d59cc46eeda8034e2b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1912-55-0x0000000002060000-0x0000000002094000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections