General

  • Target

    8296-433-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    bc7df17a4fb2cfc375f987b696e268a5

  • SHA1

    bf22b54d9b9b83e95ef78fa6dc69a442aa0b9895

  • SHA256

    5a5a1bd7efd08bc0a8a2c352e3b76443d226d7b692b9069653781683247a1b17

  • SHA512

    f790d15ab7ad017d5e4d02197f7e08e2ef020bceb3d5f7cc066e973e66193494764cec101dd802c88fa359c14dd81c48ce903bcd8c983718c431bc8cd29f920b

  • SSDEEP

    3072:AYO/ZMTFz7rwICrYVWEDmyN38+VP/DFIyCP9h7SSo6p:AYMZMBz70IljDmyNZ/FK9hF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

fud

C2

45.15.156.7:48638

Attributes
  • auth_value

    da2faefdcf53c9d85fcbb82d0cbf4876

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 8296-433-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections