General

  • Target

    101648-132-0x0000000004DC0000-0x0000000004DE8000-memory.dmp

  • Size

    160KB

  • MD5

    c3c2ab0df4d2422e3052c46d4f52201a

  • SHA1

    7891d41f01e1bf2700ebc9a1bbafc1bde52c2f00

  • SHA256

    a03ac60e648927cfb45672c96f7337a51b670437a285732eb528d0101d8636f1

  • SHA512

    f94479a5e4c5df3e36b6b190b2324488c292d34b15a8bd1a14ea729d7bb806f1c44ae91211b77a9b9382253ed1e5e3ad4e397867cab40283eb0603837635a2ad

  • SSDEEP

    3072:pYO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSoz:pYMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101648-132-0x0000000004DC0000-0x0000000004DE8000-memory.dmp
    .exe windows x86


    Headers

    Sections