General

  • Target

    101660-131-0x0000000000140000-0x0000000000168000-memory.dmp

  • Size

    160KB

  • MD5

    162ef111b456987d4b30ca174f93bd56

  • SHA1

    232ac44e06f5acd293e3464b277730d4d5db6180

  • SHA256

    5429bc1b21d26145e2042ff2bb57e23b4ddfbb62782e59cf09c3685eead68c41

  • SHA512

    cba676c39255b13f9711564e429551b11927b39d1bdd3d768d1c533298c67ade836998a5b94f88163293ec1249940f26c6118aa92223d477604b2ca7af20935b

  • SSDEEP

    3072:9YO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSUz:9YMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101660-131-0x0000000000140000-0x0000000000168000-memory.dmp
    .exe windows x86


    Headers

    Sections