General

  • Target

    2032-72-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    fa225e1858a35c414427a481cc1e0116

  • SHA1

    b557f97dca22b20304f1b132fe4c76ad711b66cb

  • SHA256

    d1250c371fefe6af4584b1f81b68a30f364c30726b7378e383d6140be8baa56f

  • SHA512

    20933e5b2c9d31f3f6bc7c714fa5cdc77edea7ed358d967a05a0ec1e4f1b81d41d1d9689f9eca3d765df4be3b592b869bea1080b7ab84a0486aad72685221cfb

  • SSDEEP

    1536:9qs+NqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2X3teulgS6pY:rqMOY3+zi0ZbYe1g0ujyzdzY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

client

C2

195.133.18.140:300

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2032-72-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections