General

  • Target

    94256-189-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    da2aec6f356909fb957fb43a24e74922

  • SHA1

    8244ee46b0a0f2a8d43dbfd76885efc6732d2314

  • SHA256

    57315bce098f2467bb9c1242cf7da331dcadd4c77973b0915f9aafd18d5a42f1

  • SHA512

    b16bcab5b28483d64f64ceb2c24a170c0c4dec825a899c067a74617269a75bd019d4f3252e96493fe82b06dda7224bca4fcb471ef45dec4d5b93aa124103b7f5

  • SSDEEP

    3072:KYO/ZMTFap2o+7O44WBeXt9VBDF7yNP6hiSS4T:KYMZMBap2oT7WcXtRQN6h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

555

C2

45.15.156.8:16839

Attributes
  • auth_value

    f2ac34cb1c86d7191bdcf219521dcd52

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 94256-189-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections