General

  • Target

    4568-152-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    81c0dc771e62cd08ea628f4e38fa94df

  • SHA1

    269b9f849e837c635f21df03e21b1cf0e7ad29cc

  • SHA256

    f71a1c16be1f792108c1dbccfd4ad5803ccb16adcbe1bd9e843d3028e66f36a2

  • SHA512

    0d46e123325ee8d2cb7a5d75a70b1cad633885219bc7c4d687ae2f8fccbd28d4c78b5df36ce327f62222f279aeeac987dcd4c32e1807c8b790f0d9c4f038d887

  • SSDEEP

    3072:JYO/ZMTFy6t7FTc5t9FWIcXV/DFBYRP0h/SSAp:JYMZMBy6t7Kr9FWrlsp0h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Mun

C2

yaterirennin.xyz:80

ncoduryllixe.xyz:80

Attributes
  • auth_value

    59a7bb64bbc9b0c25a1406a188f55bf3

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4568-152-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections