General

  • Target

    98444-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    99c84f87d6057860d2ee222165c0ee7e

  • SHA1

    b7c2fc053714efb3b304b065177c2ce1a4861486

  • SHA256

    ff9cb076dc982de7d0334dbccc2f26ee97dabbe9a0ad43a1d7d9ab671e2f76c1

  • SHA512

    7beae79b8753507f3328f443c320bd3b614e7878fdda0ebe6cca9c1dcb1066f3d537df9d5e3c2d551a8e61229f8f8c9cbfb23077e0a87c1f2519a4cccc97b716

  • SSDEEP

    3072:0YO/ZMTF02ZUB71eKd+gQ+5FVjDF/yRX1hISSHh:0YMZMB02ZUTDdhQKYB1h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@EBANIYNOYNAME

C2

82.115.223.48:26393

Attributes
  • auth_value

    3517499b9df589c8c64f775931cb7b6d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 98444-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections