General

  • Target

    1944-59-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    e5bc0fdf31e03d029b72f9421249ac2b

  • SHA1

    3db86137fe3b3f2d3a45d964d283b1974e32d235

  • SHA256

    19fb90d13504476e8f9a4e1caec2299d29df06ca901c2d0f7820e5a4e2375de4

  • SHA512

    17d5df7ccdc466506eadd61e3d182d177240e55a9281776abd46be2472703edf457ecf7e4022daf3332eb9f026c4d4904d6ee99f8b099d15e051bb544570926f

  • SSDEEP

    3072:PYO/ZMTFw/4Y7DcNjaUFyYIVCFDFJyRPAhFSS:PYMZMBw/4YkpaUFyYdFupAh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

usa

C2

45.15.156.46:31361

Attributes
  • auth_value

    7b4e12629cc7617503a18fea91b79708

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1944-59-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections