General

  • Target

    888-62-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    7568e8b231e236d11f1b5b52b9cc4283

  • SHA1

    4aed29165715713b8235049d5ebf0acf321cfccb

  • SHA256

    4e09fcb6b263c50508626b63e5e25be92a68f46e4d9fd7898c4a4571578eae49

  • SHA512

    0e949fad61f66cac4ff99022b84883d6db88a7f09e0f1b204f479cc2c9b098c172727bf4d1046ab9fe2996ca5c30a857bfd81b23cf65526bb94a416ce8e90c06

  • SSDEEP

    3072:KcvFBgCYKpi8IVJFKCJlW700QcULjDJhZ4EASNq:Kcv+tJJlm0NcWJhZ4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

bot redline

C2

102.129.141.239:23774

Attributes
  • auth_value

    f86436647f0d9e03a8b7d268eb6b80af

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 888-62-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections