General

  • Target

    940-63-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    68e3be527b0d5440b2801b08c06d1aa1

  • SHA1

    6ac17dcd30a07025e0a4a7f21a7913ea3d5e8952

  • SHA256

    11789db2e16a20bceac8614888dfe4ca932d1e67abcdbc3e07b52d9f0a18eacc

  • SHA512

    db88da939a4027a5b0723b1ceeb34aee84d0a9f7d74e82c63b6acfda1a78b2e6045bda3f73349a78c19e6dc483322ab5cf4da084bcc8272207f86c0b0ccaf353

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2o3teulgS6p:rAMOY3+zi0ZbYe1g0ujyzdm

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.153.229.95:31748

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 940-63-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections