General

  • Target

    101696-133-0x0000000001340000-0x0000000001368000-memory.dmp

  • Size

    160KB

  • MD5

    2abaef0ec0c58fa32dbb49ed263fb603

  • SHA1

    3c2c090a3c3c27106c88b60886707d8069df154c

  • SHA256

    dcd330ba92e0f27fd8c7dbf378a4842638b79320233cbfa2ba5c959485e454eb

  • SHA512

    0cd931a9d3f830f7e722c9438d8a4392d2b6d1d5966f0926d1cbad29e14cb01eb07622c19a5ab174b7945c14eea777a301752abe1fd4319c5efe3f7087faed02

  • SSDEEP

    3072:UYO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSBz:UYMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101696-133-0x0000000001340000-0x0000000001368000-memory.dmp
    .exe windows x86


    Headers

    Sections