General

  • Target

    992-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    2b101fa15590f517f7da4060005a7b4f

  • SHA1

    b15f7f0f545ad4314b24c02e5050589e090c9987

  • SHA256

    be790be75d631e988d6a3d992d116e4e702ff50871bf22be9887fa029c5e701c

  • SHA512

    99e980b53e794ba7260064a3ce454a3edcd06c5b2d36b81b327a6d07fccf36801cac85532493b341ebb81e16f0607eaa3fe1eaab15400876441312207c9b610c

  • SSDEEP

    3072:bYO/ZMTFjT+7YI7TG6bmKSqqWFXgRPyhjSS83:bYMZMBjTYY0bjq/pyh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

bonus

C2

185.215.113.25:4884

Attributes
  • auth_value

    f52d9451373c6d5d8e783a686eb564b6

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 992-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections