General

  • Target

    1828-145-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    4fa3f2e10fe9abf0971bb75f6d583997

  • SHA1

    44efe62ba5b449319062ace36814b19d8e054dd0

  • SHA256

    6367e14ef8a03717ed27df1b65d8e7b3704d12a81ea10401dc95928b5c883e1e

  • SHA512

    8516bdb2361051c75f6a74357d7277f9ddfa342ee93098e6b6ad0b47bb6a633b3afe26ecfe0fbccada6d3927c024b4a425df54cb581401ef132ba8b1893f7bac

  • SSDEEP

    3072:yYO/ZMTF9ZGIn7+hXzVuDQLJ6VMDFGjRXFh/SSxA:yYMZMB9ZGIahVuQvyBFh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

me

C2

92.119.112.239:28769

Attributes
  • auth_value

    0b41ed1bdf04c7505d47398771081370

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1828-145-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections