General

  • Target

    4660-152-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    f3114e399d81323076a5161a163ee1b6

  • SHA1

    a9c59bb6942ff2837cf6da70d86ed85f3a911712

  • SHA256

    84d42004dc6536d602e9cfc649a09a47ceb531eb68bab9bc65995ae6d47fc6e1

  • SHA512

    957d7eb9a6ac779c6a867caa6115e09cba96a624b41db9402e79fb1c80b34568254b2da589bbd3ea4bf0faf77f2f8e4b7c401dadfa01c3aff6d7b4298b3129dd

  • SSDEEP

    3072:6YO/ZMTFXnAILj04EIfk2kTHtWVZDF3yRXShqSSNb:6YMZMBXnAI83Ifk2kTHtcYBSh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

volka

C2

89.208.106.66:4691

Attributes
  • auth_value

    55e3d2ed624d802226951cc2788e8bbe

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4660-152-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections