General

  • Target

    4372-152-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    92709cc4bbfb7e01b41746bb26cf9688

  • SHA1

    aa0d56f525e3f24f77e3654d0ce37823cbad99a4

  • SHA256

    391435d0dcbf9d98eaf64777f861347e57af64a0cf11a56938e816a6b92918f1

  • SHA512

    3a0989b5fed8375237f886206193914f25613c1faed8e4c416bdd6e3d367290b3d6b442f91e695f171b5fb32ca87392c63ec4532053dce7bd49de96d07cc9cb2

  • SSDEEP

    3072:9YO/ZMTFmd8MRLcApHwQhpOVADFzyRXbh4SSkh:9YMZMBmd8MiCQQ50Bbh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Neo2

C2

yarbiegishola.xyz:80

vingerdatol.xyz:80

amikshenale.xyz:80

Attributes
  • auth_value

    194c8224e21516df70bb251b3601c4d4

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4372-152-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections