General

  • Target

    99828-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    505c4a35d7e2a5c987481794aaa8b03b

  • SHA1

    3a6354f9f64e1117bd32b4cc6089b06cf832986a

  • SHA256

    2e30cc906b3728910d24492e61834d42bed964e4b55d75bbe0c1d048cc6bd11e

  • SHA512

    bd6af9f4c38ec1d62094cf4c07aed35d5a5f19ebd46916b86cf04eb6d094709cc2e288be0d59dfc54e5a2b0138a429048b5b7f05f3febc500142ca92a6c1630b

  • SSDEEP

    3072:2YO/ZMTFxdwo4TImV0mVNWVJDFHyzPLhpSSs6w:2YMZMBxdwoPw0mVN0cjLhr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@illuviumad

C2

litrazalilibe.xyz:81

Attributes
  • auth_value

    b800efc8a5b0cccce5ca8b88e19531a0

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99828-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections