General

  • Target

    1240-191-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    785de0d06e221489a7514a33410fe475

  • SHA1

    1fdad00866c96453b262dac36536a10e48d05375

  • SHA256

    c6b6f7c1734f4cfaf93643985dfa3c656de4771cdda55a89ffc4dd4623b1ff7a

  • SHA512

    21921545fab3d5508227df5bd3c2d549ea35fbb838ad67d63d6c898b9a4e0a20a6752d565d4c0b43d83bc7eb2689804ac84349f063adef1ae717a60adb746e57

  • SSDEEP

    3072:DiC1sW0XIUikZaSTF6UP23tez42lmmhYn:DFsWwdF6vt1mh

Score
10/10

Malware Config

Extracted

Family

redline

C2

193.106.191.16:28958

Attributes
  • auth_value

    aed235263cc8f652cdb854c15cc8e04c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1240-191-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections