General

  • Target

    384-345-0x0000000000BD0000-0x0000000000BF8000-memory.dmp

  • Size

    160KB

  • MD5

    b99f157d949eb7c1337c086e1042bc05

  • SHA1

    9a4981af24afb6a64fc381283321c7700ad0a708

  • SHA256

    cf29ca29fe6803ed8c621333716faac8081ec0e89b4bb1b25c6b531fa4d42668

  • SHA512

    d993bdecf04c1e184d6834df89a627ccb1a60b7749490ba05c20c19c1d3cc1dc94ec5185cd5b0f781b6dc21d1603ecd6821b8ddbb5b95041a7206d96919875dc

  • SSDEEP

    3072:WYO/ZMTFZFoI4T1prAvzDOroVsrDF1yRPlhXSSCP:WYMZMBZFoIOUnOnaplh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

newpatch13

C2

lanalannnal.xyz:81

Attributes
  • auth_value

    b3a5f8bc32de5f2abc4d5f99402f33ab

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 384-345-0x0000000000BD0000-0x0000000000BF8000-memory.dmp
    .exe windows x86


    Headers

    Sections