General

  • Target

    1480-78-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    5d800b4915b7433b45d4a498caeeaac4

  • SHA1

    b9fa8796171287233392d1856e2b6b147e0fa59f

  • SHA256

    c4b2182cf8ed28a6a8e1e7ce98a918e8c450dcf4e69ba0a710842180e7ed6225

  • SHA512

    21cb593e795053613b70b0b4a5e859693b2c19bb2d78f555e9954b142e88114342b481c2ef5f099d59d6ba951a823866d144709993e98ffe3400619a8df02665

  • SSDEEP

    3072:ZYO/ZMTFNZGIn7+hpKkguodKqVcDFyyeX6hQSS:ZYMZMBNZGIaFguodKlzO6h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Testing

C2

46.3.199.124:27968

Attributes
  • auth_value

    2e03f2e71c0fde73929d6d088968e2de

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1480-78-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections