General

  • Target

    148592-56-0x0000000000090000-0x00000000000B0000-memory.dmp

  • Size

    128KB

  • MD5

    603ddd15aecc05b7191698afb912e366

  • SHA1

    8fb28f95c36521f1851dc2b89643ffbc297fd422

  • SHA256

    c60dc287d6f374249a2a62e849028672a47ac27b03d3b014fefeebb8f18f9baf

  • SHA512

    33bc6e5a82e462de86c24e43355dceb9504efed72b5b5b83ca59e002c6a6360b11f57f41a5e50f2da5aa0f05ee7e4d96b3eea8c60ec9d5b98a8640e09c710b88

  • SSDEEP

    3072:pcvFBACY6piwIxvJTYQEubEljQcgTjD/hk4EASNN:pcveJQxuxcW/hk4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@LEORIC1337

C2

litrazalilibe.xyz:81

Attributes
  • auth_value

    0e0ff1c389cbbeeaa377fd69c78ee417

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 148592-56-0x0000000000090000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections