General

  • Target

    652-60-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    ad5b1c3f20bb28dc69642d0b99c14e9c

  • SHA1

    eb753573a962095bb227ff311a69f81e78be79c7

  • SHA256

    ae16ec7d37201b236be90dadf149d5de2522e3aa72186e2fe6402ae7b525f6f2

  • SHA512

    eca5e49b571097da7d59e4ce59d3255eae178a535069c98f5ab4a789ec5c097f3062045e0eb9d07ef505ef5bb60aae2c4efb3bf27d1ac805049c6f5205c66054

  • SSDEEP

    3072:CYO/ZMTF93+mY1nqv2UJNwzgWF9yRZF/uhZSS:CYMZMB93RYE+10bvduh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

77.91.102.72:31598

Attributes
  • auth_value

    16a2d7f0fda0ec607bf6663d787829ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 652-60-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections