General

  • Target

    5024-133-0x0000000000340000-0x0000000000368000-memory.dmp

  • Size

    160KB

  • MD5

    eb7036b9bf9f1c6a3f897ffb1fb1ec75

  • SHA1

    0a972f4aa8385edb448fd0dd36df0835c715c54e

  • SHA256

    fcf5452627ae6bef5c3cb1c7a97baaa08a06d964e318b3bc51d9b3eee254057d

  • SHA512

    b657396f6da524b3f787aeb4df39d6ee1ccfae785a9a185f42e693387c085e2623be0f21213d72b640350176ed1eade75fd4206b57db9cacff4b8b84e099b9c9

  • SSDEEP

    3072:KYO/ZMTFb7+aI4rin8eZA0VCe2xWF5gRXdh6SS4n:KYMZMBb7BIRLpClBdh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@madboyza

C2

193.106.191.138:32796

Attributes
  • auth_value

    9bfce7bfb110f8f53d96c7a32c655358

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 5024-133-0x0000000000340000-0x0000000000368000-memory.dmp
    .exe windows x86


    Headers

    Sections