General

  • Target

    220-140-0x0000000000540000-0x0000000000568000-memory.dmp

  • Size

    160KB

  • MD5

    02e69247108c872538e20b2d84bf7c1c

  • SHA1

    76d5f5bbe952fedbee12565ed7642b4867d1dd77

  • SHA256

    5a273d175df4c85046d44a083447dd22ec73f2674759c84596766f8ec0ec7a75

  • SHA512

    8cdf924a0b3c5b22241eb01d9f2d32819a9340ed0c1c0656938373546689d34d9ce46ed999aa9f45bc1d61d9a120fb612351bd704d5cb086ada4cbcd54f28ee9

  • SSDEEP

    3072:iYO/ZMTFzD64o7KzEnpoNuVzDFkyePjhGSSA6r:iYMZMBzD64pInpoNeN+jhE

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 220-140-0x0000000000540000-0x0000000000568000-memory.dmp
    .exe windows x86


    Headers

    Sections