General

  • Target

    3312-139-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    53bbae28f3ae68c65fde1ec4ea1b66f2

  • SHA1

    dfbd0a8b8cac43b3834f75b24209c4cf8160379e

  • SHA256

    233536d4bafbe7b295f813baef0c06156edb18cffefddbcf4d1db2221fe62182

  • SHA512

    0f5a911a22b56a4c10f1e529c68ce65744dda6eafd20b7a20c3d90752b0bcdaec2bbaff12a87414cf168eb68e9fa8c060f7bf23172fe341b0cdb395a113eb0e0

  • SSDEEP

    1536:9qsCNqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2nteulgS6pY:rOMOY3+zi0ZbYe1g0ujyzdLY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

muck

C2

20.126.112.157:16733

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 3312-139-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections