General

  • Target

    960-1106-0x0000000004780000-0x00000000047A8000-memory.dmp

  • Size

    160KB

  • MD5

    9575123535902571d67e8eea02e47224

  • SHA1

    d640aaa21bc9f4aa715f5b93a9fd8a16aa7c9684

  • SHA256

    55fb2d9ecea4bc4507867aeb2747bc7209d917e4f8addc58d86ed5fb619828c5

  • SHA512

    696827dcb693ed42fb351024ac5274950cf15ba6c1627c70eb20a3f4dc1f2143d3ad323fcdc005005df752efdf0c7f8973d3b187595377b30f352207220b468a

  • SSDEEP

    3072:JYO/ZMTFgcf0hnN4be5spjX+NVvDFTyFPqhJSS0b:JYMZMBgcf0T9shXIAVqh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 960-1106-0x0000000004780000-0x00000000047A8000-memory.dmp
    .exe windows x86


    Headers

    Sections