General

  • Target

    101900-177-0x0000000000750000-0x0000000000778000-memory.dmp

  • Size

    160KB

  • MD5

    3f7ec963f1ec3553cceb59cac5d8d63b

  • SHA1

    627e076f885f53bb1d6c921c4139de0b1f77d48d

  • SHA256

    9e6ac553943b1cb7cf91cfd583be24e1acf1db0728002c20b0e0a84d9d8053fa

  • SHA512

    51a8590c2afb092f95924e6107d7dbb160be1b75e193601ad3c71495e5c991740ca4e6583d3eca24cb1b997a25256b09401702ed9996f07dd4c2f5401c547eaf

  • SSDEEP

    3072:0YO/ZMTF9BEowLke9eOsX15VbDFnWRPthXSSjx:0YMZMB9BEo7AedXFkpth

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

installskript

C2

185.224.133.182:16382

Attributes
  • auth_value

    f7f5626eb8e9e541c2d17255f9d8f755

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101900-177-0x0000000000750000-0x0000000000778000-memory.dmp
    .exe windows x86


    Headers

    Sections