General

  • Target

    49860-159-0x00000000001D0000-0x00000000001F8000-memory.dmp

  • Size

    160KB

  • MD5

    c4acc5aceb9365a512b4ab247de3a99f

  • SHA1

    314b3b0d9d6e17ae031871a3ef659bee2a6d78cc

  • SHA256

    009216ee26f0c032039a0d4607eca9f62bdd2ee525d4c12bb7d51ed7a3628bb6

  • SHA512

    c0aa34673c16aab6158ed03c20eb77a9e27e7587f7e74f7af6f79b4ddc047137a31f22dfca925e16cffa91eca27753d10cc686c45e43ed466ef4e04291ac6f8d

  • SSDEEP

    3072:RYO/ZMTFVh9owLZQxWf65jOoVzDFObRPKhhSS2s:RYMZMBVh9oSQr5jOMspKh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

32489234

C2

78.153.144.6:2510

Attributes
  • auth_value

    ad7ebeff731e5655a1b7feb5e468ead2

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 49860-159-0x00000000001D0000-0x00000000001F8000-memory.dmp
    .exe windows x86


    Headers

    Sections