General

  • Target

    2892-233-0x0000000000400000-0x0000000000460000-memory.dmp

  • Size

    384KB

  • MD5

    88b656c22cc5abd9d82c97ffa6a0c52b

  • SHA1

    ce1a115d1e83d83fedc0593968d7fef8fbad03c7

  • SHA256

    eb9c273dd0355bb22ce703b5170989ec6d24496e0fbb70d85ca3a202f2b6ab6f

  • SHA512

    b95ad7fd660afa82976fe8e42242269a62a4934b8c172c9215cbf5764d4ae76d082c19dc736e6327f62cd601a53d5aeffdb9c5ef3df3e52e5c4a852e88716b3f

  • SSDEEP

    6144:Ht0N/LnCcHvA+jTxKjZHpe/Ni1qgsQqbH5prYpNGjO3ewgGGI/EiUTIWR/aHjjeQ:0znTAyTQ1pFopQMH5prYpNGjO3ewgGGk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

botnet2

C2

81.161.229.143:39559

Attributes
  • auth_value

    21e6c1755efc59abd0a715952492e387

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2892-233-0x0000000000400000-0x0000000000460000-memory.dmp
    .exe windows x86


    Headers

    Sections