General

  • Target

    1568-209-0x0000000000400000-0x0000000000422000-memory.dmp

  • Size

    136KB

  • MD5

    afbfb2cb69b4c07c94fe13b52506cbec

  • SHA1

    d4ed55b5c8986fee425781d6cdaf498734031ba9

  • SHA256

    ecfa7badd23d32ba1746cc5e551bfea01a0dd0e009bfc682e401dbcc5210b652

  • SHA512

    db6e590ca290dd5a3f4024c917b8426b6af47a77f008b4f648b46e664eb3eefe9cc71c485eebdb8bc104f69916d8f2fb7c1361531ce7dbd218af976750cb9c77

  • SSDEEP

    1536:+N7dbx2cKCFJnk7f/rc3ZX2JVJPbMuc6igFvyTFdpcYPrzGEuZm:+FdIcKCzknKZWJDPig1yp0uHB4m

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

media18

C2

91.121.67.60:2151

Attributes
  • auth_value

    e37d5065561884bb54c8ed1baa6de446

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1568-209-0x0000000000400000-0x0000000000422000-memory.dmp
    .exe windows x86


    Headers

    Sections