General

  • Target

    1872-140-0x00000000007C0000-0x00000000007E8000-memory.dmp

  • Size

    160KB

  • MD5

    f8931e37c304cf4c70e20d3533ac7c00

  • SHA1

    e60fc607f810f9faafa1c4bb5f8811ba23cb1292

  • SHA256

    6907bd961cf2fa2ae289fc5095fd7f55ffbb69763422fe6f47c2fa0d3b22808a

  • SHA512

    4815d8f0921e72f1ff07ed2ee5e95da74fade221f058e6db98288824b7b41be61dd4d93510c4aad134f23da140beb86b811c1d88d0e0eb492160cdc9e5d91333

  • SSDEEP

    3072:6YO/ZMTFzD64o7KzEnpoNuVzDFkyePjhGSS46r:6YMZMBzD64pInpoNeN+jhc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1872-140-0x00000000007C0000-0x00000000007E8000-memory.dmp
    .exe windows x86


    Headers

    Sections