General

  • Target

    2044-66-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    552fa646351ee9bc6b158ec7caf0d231

  • SHA1

    9ffbfa7b261a5dca9bb20e9a35d99e7ca4324a0c

  • SHA256

    6419b394b0625bd6fd07b534251dd57692cac268a29c35ad9ad193b9ba4f9df5

  • SHA512

    a19266353a98de92b44ddc768de24a25ea3752d8554a1903f994ffa5b40d70b35441f7a53644a3ca27138d70ba2a3a7bd9f0ae73554145430c2af408174362c6

  • SSDEEP

    3072:UYO/ZMTFxd+Io4TImhErFgyWUgWFnyRXQhmSSM7:UYMZMBxdLoPAjyWpBBQh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Ross Trafer

C2

79.137.204.225:35366

Attributes
  • auth_value

    c13df8b0f711231b91be845c727b3945

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2044-66-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections