General

  • Target

    100168-134-0x00000000005C0000-0x00000000005E0000-memory.dmp

  • Size

    128KB

  • MD5

    0fc39f194903862a9fd8123ea32ed71c

  • SHA1

    445ec5b18a159af98f0aa78ed3594ac7e5732b9e

  • SHA256

    ac35f7b5c0e1bb906634e5242681613a6dcefa5ac842898dea419965ca6246f6

  • SHA512

    0b279baa7e8445830579316c74d565678ec7df0de56d4b1a44f59649979a135db4ebbb0e5292cb0b781dd2abe6ae962ec0914da10db531bb64f3d45cddab7299

  • SSDEEP

    3072:NcvFBgCYCpieID9L2eIrbzVcQcUMMODchw4EASNg:NcvOf9IrbB1cRchw4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@youlie_lzt

C2

litrazalilibe.xyz:81

Attributes
  • auth_value

    4229399b49b4c8e5f0d0fcabd3052956

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 100168-134-0x00000000005C0000-0x00000000005E0000-memory.dmp
    .exe windows x86


    Headers

    Sections