General

  • Target

    1748-65-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • MD5

    81605b5b9ac732dbc0d4cff1f4e844a8

  • SHA1

    96def8ff38adf9a94c50ba582935ad6a0fd1d335

  • SHA256

    4c872fb10b85c8ac66f302082de632192dc1f6c240b34bbb91a495a416c020fc

  • SHA512

    7dcdc39d34896d892b41f68a5237e79689a885fcbe987b2e256f6ec42b6f1fae792ad4ff7f75d9f2a21a49db151ccb7e8333726cf7758cb78c4f78f4dee88724

  • SSDEEP

    3072:WYO/ZMTFXdfomTSjDsOoX/AV6DFbuRPkh2SS:WYMZMBXdfoXnshX9Ypkh

Score
10/10

Malware Config

Extracted

Family

redline

C2

80.92.206.18:6068

Attributes
  • auth_value

    c05e1b91cf337cad3944b744ef6728f7

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1748-65-0x0000000000400000-0x000000000046A000-memory.dmp
    .exe windows x86


    Headers

    Sections