General

  • Target

    2300-242-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    bbda4d27a19a2ef603cb5bb4a05d3df2

  • SHA1

    53e3f053a85d222ee77e78717ab08c5beadda5e8

  • SHA256

    01c8b36713a33b8b7d2c84b11b59233674f9013c52a08c857af2be6c3cd0015b

  • SHA512

    7f823df082542b34881ea168f1c2c157156cb3d8c2daecec955923e1e816a0605f8b905f4b37cf804b9cecf455142e94af4ea85f92e9590bc5890d830971f989

  • SSDEEP

    3072:3Xz6hEM1lflDwo+34SDViN21I3ck7wZrG:3OB+3lDVkUa

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

media21

C2

91.121.67.60:23325

Attributes
  • auth_value

    e37d5065561884bb54c8ed1baa6de446

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2300-242-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections