General

  • Target

    5060-361-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    e7fd6b56379d2e9f619f016a73ef56be

  • SHA1

    03f04e8ba16277604acb1a85277da6df7b98afee

  • SHA256

    75582e9afb8500b21f20a467ecb1981ea5303062e452f07b60abec1202e945aa

  • SHA512

    b15d961a999456a2683ff3b37490c09fdc3911288f5171373ab620d55ddba74ea4295d3ac110c8daf5224ef4fe327a596ac41cdb082a4ffc0a3f5503bc63bc3b

  • SSDEEP

    3072:cYO/ZMTFMTDYI7TGyo02NqdFVeGDFxERXyhqSSRv:cYMZMBMTDY0A02Nqd3gByh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Mr X

C2

79.137.192.41:24746

Attributes
  • auth_value

    b2ede3f875f9497e5b04d55cf1daf429

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 5060-361-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections