General

  • Target

    1768-55-0x00000000047E0000-0x0000000004820000-memory.dmp

  • Size

    256KB

  • MD5

    255dd7c95d6a2f05ab31b0ded69529b7

  • SHA1

    b043149d01ae6f855a84bf22eb0c228ed33731c2

  • SHA256

    ecd3dea171d707299a4230ddcbf398ea4e2ab1e0107f16290260469ba5061b47

  • SHA512

    d8e522b3034347e04b463263fc8599d327ed0b37a2b9a66643dc00b328f615ed4273fe9fd70d6f9886429810a0dc7c4b174c46850653556c04ab222d9228a96e

  • SSDEEP

    3072:5jqzL+epQ7DuRPmWdS/LR3iTPNoe/plBg8hPqO7gcFdWg0oKWj/:5jqzwDr2GLRSk8hKoa8

Malware Config

Extracted

Family

redline

Botnet

Setup 2.523.975

C2

45.15.156.53:41808

Attributes
  • auth_value

    cd8b88b786c1ddf9bcf93de75a1f4346

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1768-55-0x00000000047E0000-0x0000000004820000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections