General

  • Target

    1088-59-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    6376f51308ae2078fd2ad4bdcca64028

  • SHA1

    c95ec0fec4da412ed6c6b2f574dbb4899a9de953

  • SHA256

    a53faaefef7021f911b43f83ad83128b658503ee3fd1ba71359f4110e62da04b

  • SHA512

    58d28a906d9dbb590208379d57b623f9b9d72a266f3d6c41d0e75fa59a33ba2b192deedbd6af1ecbc28c15557602cea990c785344e920058e89d4c4ce80fbd22

  • SSDEEP

    3072:+YO/ZMTFH3OIQjGnZK1t+zQTBiCVpDFiNRXKhkSS:+YMZMBH3OI1Ct+QAUIBKh

Malware Config

Extracted

Family

redline

Botnet

PremiumCloud#41

C2

151.80.89.227:45878

Attributes
  • auth_value

    6011f107082889840844bd9a1730558b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1088-59-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections