General

  • Target

    1932-59-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    c9771c0dc4c378d3ec5314a88c717df2

  • SHA1

    f7fa3a5cc6fd8dd613c5463992aac3ef9d5570d5

  • SHA256

    e71861167b9b295875a64448bab183b516e44afb93a2446bb35e739903c3cf26

  • SHA512

    01162fc71278c714d0923d43043826ab754b958b4d77f269de4a947c9fd4e4bfc32c8ee69050e2a68d0cfd366d04260dc22b06b55850cd0059746cdb873755c8

  • SSDEEP

    3072:gYO/ZMTFzj164j7QlEEfoWJ7VlDFYJRP3hxSS:gYMZMBzjc4IGEAWdkp3h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nam6.1

C2

103.89.90.61:34589

Attributes
  • auth_value

    5a3c8b8880f6d03e2acaaa0ba12776e3

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1932-59-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections