General

  • Target

    836-66-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    ed708b27a03b87e0864956f45034941a

  • SHA1

    294a503e5968a74b2a61d34c41f40d82be8e2414

  • SHA256

    1e459c528ebaa7544bf916c95df2bb8d8e7c54c979b57274d77e0905693d443c

  • SHA512

    96a8f621467482a322861963873c057d791ca0ca1d200a7e5bbc78c7f93a1d3bd6250331431536f32c1942d5ddd1493c92374ec43dfe5b90a4237615c997899f

  • SSDEEP

    3072:7YO/ZMTFNZMT577ZpXwWd5FcSVHDFNyRPVhGSS:7YMZMBNZMTd3XwWvFcaapVh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

me

C2

92.119.112.239:22628

Attributes
  • auth_value

    0b41ed1bdf04c7505d47398771081370

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 836-66-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections