General

  • Target

    2016-61-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    b986088bc4324d89a0866a60bf501dc3

  • SHA1

    59b00a3dec696c3452b2558f8d58092e5b420a45

  • SHA256

    34b3c067408c0a522789d571af3506ab35bb312a58e2db966283df0e1729e674

  • SHA512

    32cbf56f32dac0d405ac1487c95ee3e971ba209887596459cc8205296c7d4d640931fdce3ec8cf0ea7fcab8ef59451571ced872d87332e92a891d099248b7317

  • SSDEEP

    1536:BqsIFRcqWClbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed2ctmulgS6p:vYRclyY7+zi0ZbYe1g0ujyzdo

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

xxxPROFxxx

C2

194.55.186.201:6008

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2016-61-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections