General

  • Target

    101800-133-0x0000000000600000-0x0000000000628000-memory.dmp

  • Size

    160KB

  • MD5

    51c7d6c36a3f3fc6dfe8ca0532325f70

  • SHA1

    dbc45f5313bc2dc60f0ef40073111b4cf934edc0

  • SHA256

    3ca643347d3b07e0ca4d6561de7877e99124d559f7f6683c577b8ce12e6bcdca

  • SHA512

    36055c952cca0c083cbba8664ddc47a8b3ad538f849592b211a24bf5ab1cc4e4172e753fb9762117dc059f023c8f472074ee0931faab0752194846597e9a1493

  • SSDEEP

    3072:pYO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSQz:pYMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101800-133-0x0000000000600000-0x0000000000628000-memory.dmp
    .exe windows x86


    Headers

    Sections