General

  • Target

    145012-56-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    f2260a3f7c107646c2ec9a128f20310b

  • SHA1

    706f2245c6498ceb116d7cd8fece3f0ce2f344bb

  • SHA256

    e93c9b1411f256b3708f35297fd2c88b8c2d3285b8a447016a8a9bd7ee71ebcb

  • SHA512

    4ae801ba52cee05c3da37785f5aacb52e674aa35427d09f74e270da99090723d8b84c06c2bf4ae2389095d38d08056d2757219dacb5523198a269143035816bd

  • SSDEEP

    3072:0C1sO0XHUKYnF96nl6ZjT1sp8REu7Wehta:nsOxml68p86eh

Score
10/10

Malware Config

Extracted

Family

redline

C2

185.215.113.83:60722

Attributes
  • auth_value

    96edc2d9e7f2e01ad3f59628a1517bec

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 145012-56-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections