General

  • Target

    100712-198-0x0000000000410000-0x0000000000438000-memory.dmp

  • Size

    160KB

  • MD5

    d6f7f324a7f90e0019aa0cf39aeb12aa

  • SHA1

    01caa61ee72d5ecd7ed7312c03523fccafbae3e8

  • SHA256

    b0f7251aab8213e1afda328e2d10d4e5b7ee4ef01c3d17da554b6e3d55c7405e

  • SHA512

    3c3015965e3b766dca1f3f89a020cc7570b445403f9ef862245942452fc9d08723c90764b5045c9596a213ff1e31b75e8092b89499e0313cf9c216ce297aa360

  • SSDEEP

    3072:9YO/ZMTFap2o+7O44WBeXt9VBDF7yNP6hiSSLT:9YMZMBap2oT7WcXtRQN6h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

555

C2

45.15.156.8:16839

Attributes
  • auth_value

    f2ac34cb1c86d7191bdcf219521dcd52

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 100712-198-0x0000000000410000-0x0000000000438000-memory.dmp
    .exe windows x86


    Headers

    Sections