General

  • Target

    3108-159-0x0000000000D70000-0x0000000000D9C000-memory.dmp

  • Size

    176KB

  • MD5

    77577290bf4788991b05b07713044691

  • SHA1

    e0840cc9da7e5fd043ae198c14025b406ee24966

  • SHA256

    c46bb3f67c80d7215717609bd2a0dae9cb336fea7346dace40c64f24da1f0c26

  • SHA512

    b60ac16f592fe8e04706e4b9e2d7041b206f07d00c38aefc8d187550c233472b0290a6c9660f59575f955aa5a22db5d41218815ad5ffdb782ea6967f10d573f4

  • SSDEEP

    3072:T4nVRMcuh7ZoB10Te+FQSzsLyJqoD2X9CIDl2pbzKu5zV/dM3K6hh:3hlJqoD8bR2pbzK0V/dr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

0808-ab

C2

144.202.95.227:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 3108-159-0x0000000000D70000-0x0000000000D9C000-memory.dmp
    .exe windows x86


    Headers

    Sections