General

  • Target

    2028-63-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    d3ca8babd88792a5a74c1677b7b33663

  • SHA1

    cf188ce802968260fa972d992ab8d2933d5f8621

  • SHA256

    a99cd2c7f54d3de7a4b054784a44495e124ed24b76c065e7f182907c77dbcff2

  • SHA512

    755f07a05029a92f7c0a84a1493e645c49ab82cf5f5a0aea38fb2dcdb0c01de2c2d1f8801c0179673d368fee573f10dd83aa00fc9ebfbe9a0000100940ff10d2

  • SSDEEP

    3072:eYO/ZMTFHvI4QDX+ZkvWo4iaVoWDFEyGX4hbSS:eYMZMBHvI44DvWo4iU5G4h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

50k

C2

109.107.191.169:34067

Attributes
  • auth_value

    5718968265b60ebb63b13657cbe28765

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2028-63-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections