General

  • Target

    112-61-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    3b405e8f72aa57b402a81da9fa8aace8

  • SHA1

    2dbccbdaa4677f64650150193bd2a93e50f515a2

  • SHA256

    80b6094f4a2a3f72248d4274d67e45ed6b9995fee2789f6fb1e5ea577a897d7e

  • SHA512

    8c14e80a64cadd9510beb7c8dc63d9a48fa4077e917422bb57fd55faf0a3a41d34a7fb74d32518dc633584468b7c2edfaae591ad9d743405d6330656548e1001

  • SSDEEP

    3072:+YO/ZMTFHvI4QDX+Pc/BcbrrrrB/VxDFxyRXlhKSS:+YMZMBHvI44ec/Bc5GBlh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

79.110.62.196:35726

Attributes
  • auth_value

    4b711fa6f9a5187b40500266349c0baf

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 112-61-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections