General

  • Target

    1772-61-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    7d2c2c2d6dfa1015d9ba45081ca799be

  • SHA1

    e02602248aba374460647ef7084da75d9b269a34

  • SHA256

    ed660cdfaf71dff8efb9331aac23eebc1bdec039a305fd546bdff2275e4a2b46

  • SHA512

    92aee514140d68a9321db688052122ff2d866217267b3c93923c8f4675a965bb16c9f25d1baca45ef78fd5dd0fb658c337d51f84231a7a774c8385f76a566f51

  • SSDEEP

    3072:AcvFBgCYdpicIW1HJ7D3T+C0Qc/TjDbhL4EASN:Acv+QcD36CNcLbhL4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

les

C2

185.215.113.207:31023

Attributes
  • auth_value

    6949598fb68644e561507a0b41cb7f0e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1772-61-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections