General

  • Target

    4132-138-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    19f8a0a66d8ac31b738c61d44e196a13

  • SHA1

    eb38c940b06a89d60d80d0db543700998e4b1b72

  • SHA256

    7686945a2f86eb923d8cf8be7227b3847a15e4700da47b37386a4629c72228dd

  • SHA512

    ca4cf531e34011cb73050c870e1249c048a16e88ce4b8e024f3c7df9c272e3a388ac7b58b7a58546ff7bd5979043436980f1cbbcf3b22e72ad281e3823fafda9

  • SSDEEP

    3072:cYO/ZMTF4XuIQj/9c0mVNWVBDFoywPIh1SSI67:cYMZMB4XuIQK0mVNMRoIhb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

petyshara

C2

116.203.238.163:20264

Attributes
  • auth_value

    7ae447c44f6c2c84bc8335772075b539

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4132-138-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections