General

  • Target

    101696-136-0x0000000000560000-0x0000000000588000-memory.dmp

  • Size

    160KB

  • MD5

    b3c7a4e0e110ee96458ceda37a8d8d6d

  • SHA1

    bcfcbc63df8c2332888f66c406927995750ef0a2

  • SHA256

    7f283cb558fe2a281c44c58d9c3e60a61e7ccffe2b266f42583203a91394634f

  • SHA512

    88c69f1dc381f2d442eb9f908093eefe9414f83cdf6ea8218a35b4cd383205ee36aa9533d0168a494eaca390bbf6462a6d39f442096dc333deca85b91866b071

  • SSDEEP

    3072:TYO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSiz:TYMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101696-136-0x0000000000560000-0x0000000000588000-memory.dmp
    .exe windows x86


    Headers

    Sections