General

  • Target

    3672-150-0x00000000005D0000-0x00000000005F8000-memory.dmp

  • Size

    160KB

  • MD5

    e44e0b6b07fd85c6bce61be967a49cca

  • SHA1

    62b1e3c888f6f7f3ef80fb1cbc02689fda3295ae

  • SHA256

    474737f9491ded1ee8fb743a37287f68061584ddc404a1ba63faa2c836c06fad

  • SHA512

    abddf45fd8852690cee4a74c8685b0ae83a2978ce3b4c7f58dafbe1479c6da13f98847cdbc0e5db9975ba501725d978d8575bea13650fe810485dafc3417d939

  • SSDEEP

    3072:2YO/ZMTFgcf0hnN4be5spjX+NVvDFTyFPqhJSSXb:2YMZMBgcf0T9shXIAVqh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 3672-150-0x00000000005D0000-0x00000000005F8000-memory.dmp
    .exe windows x86


    Headers

    Sections