General

  • Target

    1564-175-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    b74d083ac269c7e7388034219a9b164b

  • SHA1

    b8a72c7c57197b3c5cd830274a9731255a0ea0f1

  • SHA256

    4b70aa198657acfa5e536e1ca711513bea6603f703e7d7eb5d43d7daf67f9a23

  • SHA512

    a68e00b41c3b0be230c0e1f9138347455b71192210b9d2cbf2db3cd2b8d0c5988a0a1831be0de16369f2c363d5d59ca61e772c84db5283a35ee7dd711376aceb

  • SSDEEP

    3072:YYO/ZMTF1JcoA7hZFfrcAa4RVDDFtyRPfhlSSI6h:YYMZMB1JcoKXfrcAa43apfhr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1488

C2

185.215.113.46:8223

Attributes
  • auth_value

    2309f1425dd45e30239a6124abef619e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1564-175-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections