General

  • Target

    1372-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    c1f2217dd4beb4c99e74a49f88d20693

  • SHA1

    eba017e6b6647bf0ab746be76fc5c553e77108ff

  • SHA256

    68fcf27bac93dd0b9034498ccfa8ce44fd996aa1fc112b5597b4f8543ccc6980

  • SHA512

    9a31a93ea1aafb5753a0e1e079fb5f02ba635a6560bd04954b2b9c55aeb6f6e8b1cc552aabaadb92eeca0fa83d8e90f387c84cf0e960cdf107f563ab27ca21c4

  • SSDEEP

    3072:gYO/ZMTFz7rwICrYVWxjNuDQDJqVNDFF0RXqhgSSQt:gYMZMBz70Il+NuQGwBqh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

3

C2

45.15.156.86:37262

Attributes
  • auth_value

    d85366020a96552bd07acdfc49dc187c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1372-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections