General

  • Target

    4024-304-0x0000000000A90000-0x0000000000AB8000-memory.dmp

  • Size

    160KB

  • MD5

    597004e804ba6bab4a67ab2279b19205

  • SHA1

    3540bed98cd8cf5775cb945b1aef8b500815bfce

  • SHA256

    8957069e8cd06fd437dd3d98afe96512bac1fc448d8dc4732eb5c55513b2a431

  • SHA512

    e5938e170cb49741263459b56391110d135cb5481acbadd27972da3beb24db72c2deeb2ade34ec3ed963eccc403a1f701acae15721a2cfe29fa3b4df7a5573d3

  • SSDEEP

    3072:dYO/ZMTFVx+2I3rG1fVLZncHzWF7cRPehvSSYn:dYMZMBVxFISn+zjpeh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4024-304-0x0000000000A90000-0x0000000000AB8000-memory.dmp
    .exe windows x86


    Headers

    Sections