General

  • Target

    4600-139-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    3785c2e7d9072ac99b319e40d341884f

  • SHA1

    270c2f90bff46773d2c9a3ec3e2729567834346c

  • SHA256

    f60755768f25a093bb1270134c91371e874e34b1c0b89e358a16ebc7045ee03c

  • SHA512

    e817d8ba43a8bf7e342b154613a2c57eb06dc107e8dc51b1ea5a9934182ba7f4b6abe40d10457e2f01739087e062747ea8da3c6191acc2ca1caa09ea222be90c

  • SSDEEP

    3072:xYO/ZMTFjI+UUZzX3mPH+JwP6eWFJyzPrh2SSU7:xYMZMBjI7UB2P0WRjrh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rozena1114

C2

jalocliche.xyz:81

chardhesha.xyz:81

Attributes
  • auth_value

    9fefd743a3b62bcd7c3e17a70fbdb3a8

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4600-139-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections