General

  • Target

    2792-171-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    de0e2e86a0cae1adeb8aa41addb0a230

  • SHA1

    36ce6915b91fe8a91a23dac74a17a800faec0b25

  • SHA256

    66b5d1ba5829d569d140d5d03710fded4b3ea20afc5889ff2e244de43afccd34

  • SHA512

    030938cffbfa5a95c4bf1514a44bf35bcca1958060bb3574542d8a7e57263140a4c99d99ded4656d2dbd158eb36f17782c2764dcb176ba5a2bb9d9181e0ce7b8

  • SSDEEP

    3072:OYO/ZMTFjTDYI7TGr0mVNWVpDFBy5P8hMSSU6K:OYMZMBjTDY0K0mVN8GB8hK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

GROME

C2

185.215.113.46:8223

Attributes
  • auth_value

    661a72ac2a03d150c942125925f4c109

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2792-171-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections