General

  • Target

    1672-56-0x0000000000830000-0x0000000000858000-memory.dmp

  • Size

    160KB

  • MD5

    7e1abebb18058fdfded14e5ef196ecad

  • SHA1

    e66b007b8602792e0839b95ef9d351bf78509730

  • SHA256

    dd686e8f04ba17be1ae4fd08acd7acdf77e2769d5e7d061f2b50ed89bfa4e5e1

  • SHA512

    d9097dfb11bcf002e07dc76cd43a34a617cd37fc008a9beeea6bbc09e713ef56ce511b0cfe60a002554d03ab474cca6b152af50d93f8d638eab40d4ac1aaf330

  • SSDEEP

    3072:nYO/ZMTFHfCR2RAYQDOOaVGbybV1DF+/RPJhDSSY+:nYMZMBHf2YtHVGby3kpJh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@twister

C2

82.115.223.56:39447

Attributes
  • auth_value

    ebf5cafd80021ba96c31d3833dbb9d24

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1672-56-0x0000000000830000-0x0000000000858000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections