General

  • Target

    4644-180-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    ba3ca3efa7b1aeb56449fa03bd2235a7

  • SHA1

    caa18f3247757d7703444e461fd6aed304197b38

  • SHA256

    88e5bfea30c3b8997be798a393a3aa5ddc5d298b42e4196849d1eda17200d0e5

  • SHA512

    9d4e9745f314d7ce475a204eb99046e1e027c415869fbbd49cd7450be15def7dfc13a78d634977dd47c25e3d2148404b7d4683700e2f5c2ad587f322e53e4e09

  • SSDEEP

    3072:CYO/ZMTFBVSInzatf02WGy5TVVPDFtyRPohXSSpE:CYMZMBBVSIGJ02Wv5Tnqpoh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ALPACA

C2

77.73.133.87:25907

Attributes
  • auth_value

    8d61195968b165108c51f8712ec15473

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4644-180-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections