General

  • Target

    99128-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    6f3c12e6037087898bd5d7c69eaa8518

  • SHA1

    8914c2c51575ebd5b17db58997779d5cf257e18c

  • SHA256

    e269ce24d0583af8a33ff256165817d7d9709de0dff04164bd864a20f25d8113

  • SHA512

    834ffaa34fb93c748e9aa40054d5207689b7a2f56c2b40f379c76446090a0e79229ff9ef6374f3a8a32439b75013211b970aa788cfee2f40d3a95869cd552cc9

  • SSDEEP

    3072:iYO/ZMTFwfCR2RAYQDOOgchjc/rrrrlXVgDFV8RXBhgSS87:iYMZMBwf2YtRchjcYEBBh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@clownadaqwe

C2

77.73.133.19:31892

Attributes
  • auth_value

    3778d9254f1f4ac7300a82c9cedbf667

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99128-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections