General

  • Target

    1632-60-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    a0387ead50d048672a011c7aa0cdc871

  • SHA1

    6118c217e977c15051167d3e1b051b29fbd4f44e

  • SHA256

    21900cd951c408d222e9289443bd0b8fe8affe4c95bf0cb162a0aa1002f1b834

  • SHA512

    7bb197c49262db4cea6673865c10eb49e5742c0a134fa36849cd0f91fcd95bc3cc0674bc0bf1d39cf7103d39af2a10f0509fd75188c096b6a34a2060c6f05702

  • SSDEEP

    1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2ctmulgS6p:r0gzWHY3+zi0ZbYe1g0ujyzdA

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

noxus

C2

13.80.126.214:9214

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1632-60-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections