General

  • Target

    1836-76-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    e7ff32678c60437c1d74b6dfd3b219c7

  • SHA1

    439cbdcf39d84a989a0ac3dd27c262752c0ed2de

  • SHA256

    4176d0bfc4441430f78c4cd2b98b933f361440d0a569046af30b2deab216cf75

  • SHA512

    c907eb880f0b5f09ec7f0fb4f16d33684bb995cb663ab39e7894aa162685669be49255dcd5446f974abce281e65cc5ad8ee8d016df915ebea95ed4b59fc37983

  • SSDEEP

    3072:eYO/ZMTFIMgUxbbsjfZOAa6RVGDFHyRPlh7SS:eYMZMBIMgUtCfZOAa6CQplh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Neo3

C2

tyastazirowi.xyz:80

yaterirennin.xyz:80

Attributes
  • auth_value

    646532deba483490225021877e8b02a0

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1836-76-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections