General

  • Target

    65088-163-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    19848d18e46234e230604325b4414874

  • SHA1

    b575b316b2c33ad951696e915de91fbcb6edea4d

  • SHA256

    96173a147189aee2d99e0d5f7499aadfae1a4d29bb0d7fc69307ac58d9b05148

  • SHA512

    0abd1d8e623fcf5f3d07f95102d6aa349c145321cc1ae0417ecbc3ab37f6d6b8f377a2c90e5812d482f2b50031c8687b641c1167ab7c7566f48d8499673b47a2

  • SSDEEP

    3072:mYO/ZMTFVh9owLZQxWf65jOoVzDFObRPKhhSS9s:mYMZMBVh9oSQr5jOMspKh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

32489234

C2

78.153.144.6:2510

Attributes
  • auth_value

    ad7ebeff731e5655a1b7feb5e468ead2

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 65088-163-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections