General

  • Target

    1420-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    8e3c75e0d49076f26cd955315298ddba

  • SHA1

    f96bd2c3a4b70dd09299b808d7db076a29ae86e7

  • SHA256

    954980bfba3c8dc1db433b35b9d10639ed6864b5455df4b176cde0987bb56476

  • SHA512

    67519bcccd70aef78358384e89b12c1d9c08e5736c0d3257bbc190707cc3595504402af7ecd0775722d255eda97555b0ed1c7be08848f6857bb8cec74da46a28

  • SSDEEP

    3072:CYO/ZMTFLj+y4N7ZETKdurVPBOMPWFiVRXEhNSSYa:CYMZMBLjp4brUPBBEh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

New1

C2

89.23.96.39:44465

Attributes
  • auth_value

    da0f38445d4388aa8d9d8d856edbd407

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1420-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections