General

  • Target

    4648-143-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    9802c05c1c9e424c69ef2b36f6d7ebd7

  • SHA1

    293da3ef448aee7506207b4336a991a69e4e73a0

  • SHA256

    412917b0427472507d35dd71f4950e5b0aff2110cac085f3ba229dcd4c75fcd6

  • SHA512

    8ba7cbc86b45fd96d8dde32b9ee644f437166b91dff5fe13d2e89a2b80066c0fb6eacf4f804e46928b3946c0c51b2e5e78417d1c754596ee419ad0d5a29915c4

  • SSDEEP

    3072:7YO/ZMTFNZMT577ZpXwWd5FcSVHDFNyRPVhGSS8U:7YMZMBNZMTd3XwWvFcaapVh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

me

C2

92.119.112.239:22628

Attributes
  • auth_value

    0b41ed1bdf04c7505d47398771081370

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4648-143-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections