General

  • Target

    412-200-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    dd8688c20da84056fe3e48e17fb1a1d9

  • SHA1

    4fae689236260fde400927037c651dc348f3c5ef

  • SHA256

    3400083e435f22f2dcd9171467dc8f8530f2c4fff181de151b4502128095b56b

  • SHA512

    4c087405d0f1dcdac17776b1f2797654e89bceb76c1faeb3c28066b5f4518618a30e282c45da2cbff4a6d21478353dc35060008143932e2212c3e53fa46ee5d4

  • SSDEEP

    3072:TYO/ZMTF3XuIQj/98KkQy9yvT/VGDFTyRXIhjSSsP:TYMZMB3XuIQyKkQy9y4cBIh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

31.10

C2

194.87.218.5:9630

Attributes
  • auth_value

    6223ceba7350b5fdfd29a51c01ad5fdb

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 412-200-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections