General

  • Target

    131936-154-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    0012b00dba3ba1fc0ed07e603c62a6ce

  • SHA1

    b3b575e76e4474b4e1b5fa956b2b2031a823d5e4

  • SHA256

    d5ca6c5558185032a0a5a3e607679f4538338529ee052641df5c469ac5490e5c

  • SHA512

    dd817d126ea27cf45633b359014a1cfc48c970eb39cfa985397005b4c0f86c848795aacecb3187ba61cffa93d96e5f033db05bfef26c0512320972dc6045072d

  • SSDEEP

    3072:GYO/ZMTF02ZUB71ePlJW4OVyDFIlRPHhYSSL2:GYMZMB02ZUTqlJWSYpHh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@EBANIYNOYNAME

C2

82.115.223.48:26393

Attributes
  • auth_value

    3517499b9df589c8c64f775931cb7b6d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 131936-154-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections