General

  • Target

    1780-72-0x0000000002080000-0x00000000020BC000-memory.dmp

  • Size

    240KB

  • MD5

    6a20e454fe50bd93859ce0f65f83eb78

  • SHA1

    8b7dd42db379bcb654281b89926b89504808e5e9

  • SHA256

    3f012512d81088fe383cd7f6878ef1a63381196c81d899687c9ee1935eff33a3

  • SHA512

    8a81980f62d75dc8b80369a04e75d23e504e1200ab941abb90bde8a1b10e1479d9e79e3fd540fde2eb7c781c03ab892779aa0dea031ccd633144e2e50caa20e4

  • SSDEEP

    3072:gjq7LmeBQr+TR/MgiRBp4Sy2n6pOOgA1nw/vwAlB1Z1oe/EQh7P9hr9OrqJn6z:gjq7w+W/Bp4Sy9pOd9hN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

CHUBAKA

C2

77.73.133.87:25907

Attributes
  • auth_value

    1317d86704d0c967986f3aa7c5c95a1a

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1780-72-0x0000000002080000-0x00000000020BC000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections