General

  • Target

    4992-140-0x0000000000350000-0x00000000003B0000-memory.dmp

  • Size

    384KB

  • MD5

    1fbf3bee341f0e89d685eda99474606e

  • SHA1

    187ad675c3706c71b5b07ea93d3bb1b01e1a1277

  • SHA256

    1bcacf77e9c294747f0e7994749362fb64dab3314030dd97f6eaf114302b1ad2

  • SHA512

    5a98720b610f0025e384a975b017a8a6382ca2df3c39de05b5d98b0c55083d2efead8d8fa03dcda842cb366d9bfa81439b351f3d09ee4d339b2a0fda40a258db

  • SSDEEP

    6144:idmub3lTEbu5pw2hl0aFypvtphfb9NV46zGfH1dS3eFTJVwVKmh8LFRxNyJJXBBN:KB7ah2hSEypvt71MoelJVwVKmh8LFRx8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mario23_10

C2

167.235.252.160:10642

Attributes
  • auth_value

    eca57cfb5172f71dc45986763bb98942

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4992-140-0x0000000000350000-0x00000000003B0000-memory.dmp
    .exe windows x86


    Headers

    Sections