General

  • Target

    3292-165-0x0000000000750000-0x0000000000778000-memory.dmp

  • Size

    160KB

  • MD5

    6d8041907b58418e795fb290e6678632

  • SHA1

    ee0e542bd88e9c5cb6268a57d2a34e71ab1d5554

  • SHA256

    16fea7f2b50c56bde1e680bfd1b80d742b3d0849becc45a48f107c20fd71b22c

  • SHA512

    e9709df51effdd01d38aa011d3c8a2be1ddd8308ee52da16c7dd1a03dd4a27a219480613aba9890aaed1a902c745d314e6e053c49889ab65babb0e28b1b18405

  • SSDEEP

    3072:RYO/ZMTFzD64o7KzEnpoNuVzDFkyePjhGSSz6r:RYMZMBzD64pInpoNeN+jh9

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 3292-165-0x0000000000750000-0x0000000000778000-memory.dmp
    .exe windows x86


    Headers

    Sections