General

  • Target

    1564-66-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    6ddf8ab40a74a493e33ce4dd818283ed

  • SHA1

    233daacf54a591c52b57ed80f5a6f1fe5a6cb109

  • SHA256

    1efad27baab224fd0626a3afdfc9d421af274589049741d62a88dcdbbbb8a3d7

  • SHA512

    1ce5698db7ef32395f0d27b03a523223aa6efdfe3b31a20c2cfff6179b36187796079b348f37e68c6eba64556431cd19e4ea0fc6bc8f39e3974ce289679703e0

  • SSDEEP

    3072:KYO/ZMTFXnAILj04QfM05acdVPwDFTyRPFhdSS:KYMZMBXnAI8hfM05acY0pFh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

GD14

C2

49.51.90.156:32323

Attributes
  • auth_value

    78d149ed0f1d4b3306e92e2808a8357e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1564-66-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections