General

  • Target

    2672-302-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    57a37874317f2671d4656d127db77519

  • SHA1

    df346e5293af06b13e3eb58f29fa0b695ac81162

  • SHA256

    742d389476140545e173e4e8d5404d96913b04465b25ecc2d6ec9893707b24f0

  • SHA512

    ae872bcac9933af75558fe9727861cd7c7ecf3b98d9fe6a1c3c3f40f605efa654deadb8cdf17b832c81e36efc6aad07fbfcfc8fb07bc2230efd455ddcdc4bffe

  • SSDEEP

    3072:5YO/ZMTFXfCR2RAYQDOOsYUBNwVlDFSyMPEhHSSw6t:5YMZMBXf2YtBYUBNiTMEhx

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@youlie_lzt

C2

89.23.96.53:31875

Attributes
  • auth_value

    4d6a429b89f6e4f0b0ed2ed92c2fd492

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2672-302-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections