General

  • Target

    1756-77-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    21f90c06e6dcd4a0c7d6f7f514baf552

  • SHA1

    5abd36190d7828188157e2f4fe764b9bc489a001

  • SHA256

    439663c2c69fad24e86a182b29c63318c262e8e1a5525768278cd35e666c5837

  • SHA512

    46f6d9e8afd14405efa39cfbccd9c1aebb627ca1ce1eac7f851cb0f3e02bbf5b1a1d5cf940fc64836e4f442009e952c1c7fe3b8e2b72f18462c64b7ae3e8819d

  • SSDEEP

    1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed20tmulgS6p:XEwiYj+zi0ZbYe1g0ujyzdQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

sirus

C2

147.124.223.126:4444

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1756-77-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections