General

  • Target

    3868-140-0x0000000000790000-0x00000000007F0000-memory.dmp

  • Size

    384KB

  • MD5

    800dfa93d6cdb90f31181e2bfdc758d3

  • SHA1

    0d9c31e74783e9dea5db85cc1c260cbac7c61683

  • SHA256

    272007d1f1141c6de6382771353fdbcbd6be5995cc0306cfca43d627b35700f7

  • SHA512

    2fcaa61813f52dcdabddb66abfe4635dfd445c0b33c23f600a2a6fbfb5a96bef89f5e924690f460359b9e4240590e0cda7b40405264b3c3baa009c7755f7dde1

  • SSDEEP

    6144:Odmub3lTEbu5pw2hl0aFypvtphfb9NV46zGfH1dS3eFTJVwVKmh8LFRxNyJJXBBN:+B7ah2hSEypvt71MoelJVwVKmh8LFRx8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mario23_10

C2

167.235.252.160:10642

Attributes
  • auth_value

    eca57cfb5172f71dc45986763bb98942

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 3868-140-0x0000000000790000-0x00000000007F0000-memory.dmp
    .exe windows x86


    Headers

    Sections