General

  • Target

    4196-144-0x0000000000330000-0x0000000000358000-memory.dmp

  • Size

    160KB

  • MD5

    83c45245eb3d8ee86851bd551b2a86aa

  • SHA1

    82b3714570071838f948a1440548ffbc660d1989

  • SHA256

    db38ede58b095fa347a724abc73ea7cda142d5d5af0e48e73cf2f8738ba38b96

  • SHA512

    1e6150ba6f07d0a40e0a08a6a925845575ebb063b29cd3e9a5c969a9fc695c4b9100fb1f0c2fe5e6b7e6052e997baf3bb1b450d4c58ba4ffb0261b1a3a3b59a7

  • SSDEEP

    3072:3YO/ZMTFzD64o7KzEnpoNuVzDFkyePjhGSS96r:3YMZMBzD64pInpoNeN+jhH

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4196-144-0x0000000000330000-0x0000000000358000-memory.dmp
    .exe windows x86


    Headers

    Sections