General

  • Target

    96768-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    98ff854234875891a3cdd28f9bf0e35a

  • SHA1

    e7d7b5a1a876eed18bd46957ff36bdf57764ff2c

  • SHA256

    d2fb74fe88ffe1fff9e7187ecccf47007569088c8236d835e330828ba8099216

  • SHA512

    82f32fdab996119c8f0d4c0bae8aa7940c905b50cb962cd69b4c0c72e03894faa9d222a4fa996fdd1e5ef594676f51eb25051da350ca371bfc38f5bb5eb769f6

  • SSDEEP

    3072:BYO/ZMTFmNaoXzCwBaUOyKzVuDFxyRPQhgSSQK:BYMZMBmNao+CaUOyKUOpQh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5555

C2

45.15.156.8:33890

Attributes
  • auth_value

    cefbac8450ea526d0fcbde6f5ff0709f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 96768-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections