General

  • Target

    1720-68-0x0000000000400000-0x000000000041C000-memory.dmp

  • Size

    112KB

  • MD5

    8f2d46bf80d77c29ce80ea1cf819e2da

  • SHA1

    219c1d99b702324a0affdd29a93a377bff79eeb2

  • SHA256

    2e540f8e7859479f5cc96e73d73e35fe8bf6f1273599c1a7b11bb6f82544e4df

  • SHA512

    36cb8525c6c01f898fcca170d79d508b9472ec1189edd8da3378e8514d9c679775511c75763a3507c31eacc6f3c62d465eb9288d0512503b46d391dce208bf31

  • SSDEEP

    1536:QqssKqKhe1aG6jejoigIecIIy3iXYvQrKpqt4ulgS6p:+/ph/YeEy3YG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@HappyV2

C2

mcth.xyz:40474

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1720-68-0x0000000000400000-0x000000000041C000-memory.dmp
    .exe windows x86


    Headers

    Sections