General

  • Target

    972-64-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    526234073fbb364ea93d8ab4ad7d31a4

  • SHA1

    361d52bbe46ef15de8544771ceb00996717858e5

  • SHA256

    711a83540f11338d8b99201f2b4bdec3df5cfeb3b42e81eac5f2d99fd7db7357

  • SHA512

    f1aa0eefd57d017a93614d16978ab973c307c487b8777de17373b4799508f1ee0d516206f1f68ea1799691a457de719b02d6bda8929b567e3f0af4b3fd1ec218

  • SSDEEP

    1536:xqsIjlqzWlbG6jejoigIr43Ywzi0Zb78ivombfexv0ujXyyed2DteulgS6p:f0UeYr+zi0ZbYe1g0ujyzdf

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

PIE

C2

51.83.137.127:34852

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 972-64-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections