General

  • Target

    4240-209-0x0000000000790000-0x00000000007B8000-memory.dmp

  • Size

    160KB

  • MD5

    482f359ebc465b3de52e4ce3d653c5eb

  • SHA1

    5af4fcaebde4b7428be97a1125d6537377358af3

  • SHA256

    580469c78bbf2fb3e4e67f24ea5090857a113c684f88dd8b25972dd155ed775a

  • SHA512

    cce89d344db5cd2f214c3852d9527443ea6c3f5489fb1a75cbf7d854ce56b8ffbb70588d3478e296df1ae01b4b72d78ed438804ace53e229098375f25a568467

  • SSDEEP

    3072:KYO/ZMTFgcf0hnN4be5spjX+NVvDFTyFPqhJSSTb:KYMZMBgcf0T9shXIAVqh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4240-209-0x0000000000790000-0x00000000007B8000-memory.dmp
    .exe windows x86


    Headers

    Sections