General

  • Target

    2044-61-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    b90e5272257de274980716cb5e99f0b8

  • SHA1

    048943bb523464b6ba7f1436212d501c039bdac1

  • SHA256

    fa4a7e3299ea79f5fd56ae3b548ba89e3db9b3eb118682896c059eb4954c80f9

  • SHA512

    aa5817d1ebb0c115275f1e8ca39e013b7f432e7393564caed74222c9aaa811ebcc9c840f42a86e260608603e423a42ffaee32da813b81d49d847e5edb2663ac6

  • SSDEEP

    3072:FYO/ZMTFxtgoYzdxm02WGy5UVViDFzyRPZhCSSwx:FYMZMBxtgomE02Wv5UKMpZh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

walhalla

C2

79.137.192.41:24746

Attributes
  • auth_value

    33d116d7be31f30e8503e76ee70b67a1

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2044-61-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections