General

  • Target

    3396-140-0x0000000000700000-0x0000000000728000-memory.dmp

  • Size

    160KB

  • MD5

    59f3e4d26d19d6000236e7fb2e29891e

  • SHA1

    d2fb08221f66213654a593c96a517e1690e857ff

  • SHA256

    a6602786cd5f2a735adabc6933d60f3295174b51271d5389cf020057e0875342

  • SHA512

    53f9ff7b0e857ceb4a313e1baee82eb5e1b2f837bdddfd79d6b5284ddeca0fb0002430b8bcbf41260d4f5154b119ba32d04e2a5d891987f5c1c31b6a9d4af4ff

  • SSDEEP

    3072:eYO/ZMTFzD64o7KzEnpoNuVzDFkyePjhGSS06r:eYMZMBzD64pInpoNeN+jhA

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 3396-140-0x0000000000700000-0x0000000000728000-memory.dmp
    .exe windows x86


    Headers

    Sections