General

  • Target

    1768-56-0x0000000004810000-0x000000000484C000-memory.dmp

  • Size

    240KB

  • MD5

    7bb932ed93ac073fec8c818457389ab9

  • SHA1

    a81370697ccd65b77755b379153c462eb55542da

  • SHA256

    0ec53ea786700c24ce8374556126307564f09262281ea685656cc7ae310f6922

  • SHA512

    e91921aedb355204ca9d27792add5fcadfe57e3631398c3fc0e09225127c8af6d4792429730879690b9a726679d252b458f987f00b7dfb1ecfc1618fa635ac52

  • SSDEEP

    3072:EjqrLYe/QOPHRLygCejskI/O1cMVgUSEWoe/ERG6S2/hrqOU4mCai2fL:EjqnZPQHeQkIm1cMVvIe/hjmt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

13

C2

92.118.36.245:21100

Attributes
  • auth_value

    9f9175abcf4bd9f60c9429b6f6160ab8

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1768-56-0x0000000004810000-0x000000000484C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections