General

  • Target

    1020-290-0x0000000000370000-0x0000000000398000-memory.dmp

  • Size

    160KB

  • MD5

    6255b9c7aef1fc3f2dec726f0fe724b8

  • SHA1

    e77e79e393dd9b9c33d6b30bb874e7f0113e2843

  • SHA256

    37e28c637f421c61f5d6219ed5858128d09361662b58ee9ecff0d453b402fbbf

  • SHA512

    51254acddf58a883f91778eeb91a7ecacffdb5444c1fd6bd19d62e087ef523b2996259d56817902f07a50199b6b0c32e7512e6f9a7cd914ef67043882387065e

  • SSDEEP

    3072:YYO/ZMTFgcf0hnN4be5spjX+NVvDFTyFPqhJSSlb:YYMZMBgcf0T9shXIAVqh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1020-290-0x0000000000370000-0x0000000000398000-memory.dmp
    .exe windows x86


    Headers

    Sections