General

  • Target

    99836-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    e8a38fd24d3660d4b9615c3bde3aed16

  • SHA1

    ab33a5f21154d4451ec8050662732ce39dc6ec93

  • SHA256

    1ed20e4f5f1dce478b1bac3b74b161440172c367bea4851ed108e8efd000f43a

  • SHA512

    e226b2209828d36844a7a5006c0f2f920085e86331596ab24b80ff02a435bfa14ebcc83ef3765dcbc46d061775a6ce75d9ab222d00cadcfaf5fe9150fd8acc13

  • SSDEEP

    3072:0YO/ZMTFPFx0BL9u2HwQBpWV5DFhyRXDhwSSv4:0YMZMBPFx0brQQ0GBDh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@EBANIYNOYNAME

C2

82.115.223.162:26393

Attributes
  • auth_value

    3517499b9df589c8c64f775931cb7b6d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99836-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections