General

  • Target

    1008-56-0x0000000000090000-0x00000000000B0000-memory.dmp

  • Size

    128KB

  • MD5

    3cc74e1f1f25eb5f5b3394bd56e04d54

  • SHA1

    0e49fc9595397d0b9971cc9b20c99d4b8161b8c4

  • SHA256

    b47668aa468bdfb36246b0c22ded058406c4d9e2a087dbee8694301774be58d2

  • SHA512

    cd1b97a62645989043877f76ecb43ce8cada330746b2f5ca9dd1d6309d0351c115edbc704cc625d741f8c89c6424549fdf389de60266c380ccab6cb4fda4dcd8

  • SSDEEP

    3072:PcvFBICY5pidITxoXUyLs7DuQcd9jDiha4EASNE:Pcv2HpyLs3nc3iha4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nam5

C2

103.89.90.61:34589

Attributes
  • auth_value

    f23be8e9063fe5d0c6fc3ee8e7d565bd

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1008-56-0x0000000000090000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections