General

  • Target

    684-59-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    0280b2c9d1a1d10d6e8bdaff137510c5

  • SHA1

    071ae94bdb1b32674178eac0c0d2a30aef1df6d0

  • SHA256

    6fb33abd4a61f2ba73d5e0de9a2e4f6f42f4c40c269c84553aaab9ddcfa10293

  • SHA512

    6451fc085f4c3844939da779228301d6829e93e1596587e03f992cfabc96138c5202e742dbe220e024491372832df3ffd3e2b877b8c3922c921f047d65c530d4

  • SSDEEP

    3072:QC1sc0XtUcRJrXaGQfobM6IrqDbazqekEByt0p68ZDbagTckpxS1Uz2hKlwxQLhz:jsckaGQfobM6IrqDbazqekEByt0p681/

Score
10/10

Malware Config

Extracted

Family

redline

C2

168.119.228.126:11552

Attributes
  • auth_value

    90f290b12e00bdfa1c65706339cb7592

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 684-59-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections