General

  • Target

    4872-264-0x0000000000840000-0x0000000000868000-memory.dmp

  • Size

    160KB

  • MD5

    af4117f32916a2b35efe8a8d16457f0e

  • SHA1

    9de9086e68278866cb16577bc49d217347693a50

  • SHA256

    cef367920fc98ebf7d4294beb5dd0b76502c06b64c40873bb6d1fd278ab7b557

  • SHA512

    aad41e22529bb2e711e50ad6e224669dd9ab3efc420d0d1c030f567ac0c410806eb61f514116b443c11c27accae202e4ff1d46c3666f4f9e99a71fa6475e535f

  • SSDEEP

    3072:/YO/ZMTFjY+Ef5T+Ufy5BgyW0CWFTyRXnh4SSU1:/YMZMBjYrfMMnyWn1Bnh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

easy1121

C2

chardhesha.xyz:81

jalocliche.xyz:81

Attributes
  • auth_value

    90fe7012b6ac914d80ddd3a7cbe95e84

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4872-264-0x0000000000840000-0x0000000000868000-memory.dmp
    .exe windows x86


    Headers

    Sections