General

  • Target

    1660-133-0x00000000003C0000-0x00000000003E8000-memory.dmp

  • Size

    160KB

  • MD5

    440cecc7ffe761cd54e1cb9fe443d92f

  • SHA1

    3dd55cfeff98e06319f08c5df6baf3863d58b519

  • SHA256

    0d34e4bc554cd58030730aea71fcc1015e36234afc67d76e207f8195d8134f63

  • SHA512

    f627ead42f037bef0ddcaf2f62eff75c90ec3cc1fb6509477fa29d15a934b97fec242be07dbc00999cda18567d515c3ac8dd5f78fd14b137e93a5e472ca491f1

  • SSDEEP

    3072:lYO/ZMTFtJjcZ7GFn/gQeJGV4HDFPyRXehsSSsz:lYMZMBtJjcUxoQqQBeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1660-133-0x00000000003C0000-0x00000000003E8000-memory.dmp
    .exe windows x86


    Headers

    Sections