General

  • Target

    4792-136-0x0000000000350000-0x0000000000378000-memory.dmp

  • Size

    160KB

  • MD5

    a1ce93eff1daa0c72a2fbfd23e8a6788

  • SHA1

    55dd3a0afcde3d9881b76c315bb8973ee7c74919

  • SHA256

    ee88107aadb45e2b3aff0fff23a71a54dc6d4391cb9e97a4200970c87a3d5a74

  • SHA512

    ae52509c23a0750a776880ec37ced8912682d56663733788af816b0281b6f98296d3e8524022e152b3f7efc423fd4be4fd74e2eb4e39f7a224e86265275812d9

  • SSDEEP

    3072:eYO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSXz:eYMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4792-136-0x0000000000350000-0x0000000000378000-memory.dmp
    .exe windows x86


    Headers

    Sections