General

  • Target

    99868-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    ee8a37ff00fda6a45ecc6346528107fd

  • SHA1

    b0327d03aa0da45582b01886afffcd836426aa46

  • SHA256

    25025dbb34f76d88a22261fc069344c72fc7816569152875a5c7df778c58e870

  • SHA512

    d71f69a1202db2ef322e265412b8099ad66216d9f64ea8a90a72fe0d731624784c4f5f308c73561d85f052d66ad8da1d9b1911b7d1cf9fb318a58abf05b378df

  • SSDEEP

    3072:NYO/ZMTFBtgoYzdx89KZXc89VMDFzaRXkh0SSov:NYMZMBBtgom0KZXc8csBkh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@th1313teen

C2

47.87.141.236:80

Attributes
  • auth_value

    c26f02d6a743b1956793b6fcb3be76d1

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 99868-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections