General

  • Target

    148992-172-0x0000000000500000-0x0000000000560000-memory.dmp

  • Size

    384KB

  • MD5

    31390cb6c8cdd7aae023fd2e9b89c5a8

  • SHA1

    8d3d4492c4e1381b57ae52d25a7f61bddb502673

  • SHA256

    5e8503e24a9489e12afda41bf116523515614b70b011eec96ccd942798e46f51

  • SHA512

    2c8b7ea61ebd0d94e40777076ed297b41bdc7ec6fa3fcad6529d2136773623bdcfa3ab3dc1485d5931550bc183006e75f34bb47c6636ea3a94a88543a49dab84

  • SSDEEP

    6144:Rdmub3lTEbu5pw2hl0aFypvtphfb9NV46zGfH1dS3eFTJVwVKmh8LFRxNyJJXBBN:rB7ah2hSEypvt71MoelJVwVKmh8LFRx8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mario23_10

C2

167.235.252.160:10642

Attributes
  • auth_value

    eca57cfb5172f71dc45986763bb98942

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 148992-172-0x0000000000500000-0x0000000000560000-memory.dmp
    .exe windows x86


    Headers

    Sections