General

  • Target

    101736-133-0x0000000000360000-0x0000000000388000-memory.dmp

  • Size

    160KB

  • MD5

    285d85224a04787aff61553abe31038f

  • SHA1

    4e84325b4795cfc68d73146413762d80faced74a

  • SHA256

    4d7dc34a574a6bf61c801c88ba2f027e44110b79bf7399d2174b3ee4894ff608

  • SHA512

    e661f20f84cbfa7715d5916ebefa97d1fb198237091be19dd305ea5e9e7326d46ea7430b75798c045ff80fbcf5c58d4e85f08875760e2d4bb88d38d8720687c3

  • SSDEEP

    3072:zYO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSCz:zYMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101736-133-0x0000000000360000-0x0000000000388000-memory.dmp
    .exe windows x86


    Headers

    Sections