General

  • Target

    1508-391-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    2d97122896b63d62a666afd6001a94bc

  • SHA1

    05b4edcc07c9c30a4e4485d36ccf38e23e65c875

  • SHA256

    a4e087e8775c53c7218aae276b020c73804ec1568d8e479bb049ded7bcebf659

  • SHA512

    4d5aeb7f3d9d821e5c6e2d1adda44ba395258fb40dc58342dc115c19b6afb28c1b4532796f4f9a49079390f53871cafdbcb7b2c294ce98f8e37b3d24b6f9e473

  • SSDEEP

    3072:ZYO/ZMTFH3wICjEY46Mp6yUuV1rDFFyRP0h2SSt4:ZYMZMBH3wIxT6Mp6yUOr6p0h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Nigh

C2

80.66.87.20:80

Attributes
  • auth_value

    dab8506635d1dc134af4ebaedf4404eb

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1508-391-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections