General

  • Target

    592-63-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    01f56dbddc36c5ac5d52e78da0e1673f

  • SHA1

    7f8d853d1202d5975b8f9f7f4aa84613e05e8bfd

  • SHA256

    fe6c313fe11a7e67c01b96eb54f08fa65c74040c5bbd7861f80f64ff157c266c

  • SHA512

    9e7a432f961d7f2b8bb8aad5447fb2671150f8c9f208d275b940ebda85f60bb0c2cf07308fb6ee4588e2a1e62500844ccc4654e41e362f0344bbfa99ca35310a

  • SSDEEP

    1536:9qs8NqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2dteulgS6p:r0MOY3+zi0ZbYe1g0ujyzdZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

JBL

C2

109.248.144.242:25242

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 592-63-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections