General

  • Target

    4776-167-0x0000000000510000-0x0000000000570000-memory.dmp

  • Size

    384KB

  • MD5

    5ccc0cc650e9e6420e0f3be98ebba1e8

  • SHA1

    e9508508d0816907186bfb9c2d5ca3ef63edaba8

  • SHA256

    492dc53f519bb12d8d14a4d4a0da3b73f889579e871da74d2e5cfeb8688667f1

  • SHA512

    adf37a6886682638cd45656314872d128b8ab22f3de2c8a067ff92d5c62ee9ba2335c00e5d0427acbb3f55b326722189925e08cb7adc32e96afe861b82db5b66

  • SSDEEP

    6144:Gdmub3lTEbu5pw2hl0aFypvtphfb9NV46zGfH1dS3eFTJVwVKmh8LFRxNyJJXBBN:2B7ah2hSEypvt71MoelJVwVKmh8LFRx8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mario23_10

C2

167.235.252.160:10642

Attributes
  • auth_value

    eca57cfb5172f71dc45986763bb98942

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4776-167-0x0000000000510000-0x0000000000570000-memory.dmp
    .exe windows x86


    Headers

    Sections