General

  • Target

    952-148-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    cac8ea252db8c9f6944e80928096197c

  • SHA1

    4821c8664a0ef2dad9ea82f93c2bede709b379eb

  • SHA256

    0cc5ef749f0b6f6208dedcdc9b3cc8ef8d776ea4b2b0fac44ca079d476355ed3

  • SHA512

    8c7d9bf442f7a8a66f1802407952b4dcf590c64a51fb9bb0de02f7903a702ead0e4d28d73323fa9becac8e615deb9817a7108bb65e3c6dca2801546b5af3e039

  • SSDEEP

    3072:sYO/ZMTFsj6AIQv+UNIfk2kTHtWVoDFtyRXbhLSSkK:sYMZMBsj6Ag2Ifk2kTHt96Bbh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Buk1

C2

yarbiegishola.xyz:80

vingerdatol.xyz:80

amikshenale.xyz:80

Attributes
  • auth_value

    fa7cfb5d22dd35ec4776a9ce5ffd5a26

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 952-148-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections