General

  • Target

    34160-64-0x0000000000090000-0x00000000000B8000-memory.dmp

  • Size

    160KB

  • MD5

    e860a1473234e1614ae2072e69de189f

  • SHA1

    1bdb7a1287dddc0b4fd6430194a2a2c355152f5c

  • SHA256

    12d204e94345ffd906e885719867c1d286157b249b0da2ee643ec0f7b659a4c9

  • SHA512

    954b8551d153c5b31d419e54a30ba225f4b5b5f4c4acbc386a6b52556f58f32052989be620919607f30e501fea68289b236ea159033ec40e7fe05bd408e8e0d4

  • SSDEEP

    3072:PYO/ZMTFHXuIQj/9N1egQ+5zVpDFXyRXIh0SSL4:PYMZMBHXuIQv1xQywBIh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

3kpess

C2

151.80.89.227:45878

Attributes
  • auth_value

    5c6e3d1ad35f629fda6e9b859b896395

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 34160-64-0x0000000000090000-0x00000000000B8000-memory.dmp
    .exe windows x86


    Headers

    Sections