General

  • Target

    1084-59-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    047cf207c363c7ac1bbaccb2c7f4f56b

  • SHA1

    dfc82e3365233c496ce78ef5c04db79f3c3ba47f

  • SHA256

    bbfaf01079b60e80b8099527a73316ac6392bf63604e7eeebe7ee5dd44506c76

  • SHA512

    f9dfd048d5d75c976b3bb3a128ac160f37b25b65f2b8faf705859eceb9bf691155d94cb7aa8536433c19c8c469d05df3b8be93f88760c19cedfb95207bf783e4

  • SSDEEP

    3072:9YO/ZMTFHXuIQj/91ONkuk5FdPV9DFXyRXNhoSS:9YMZMBHXuIQHONkuk5F1wBNh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ggfgg

C2

151.80.89.227:45878

Attributes
  • auth_value

    9b9a90d3ba4ae0207573c7f0cd7cd829

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1084-59-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections