General

  • Target

    5020-169-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    442066a923f3eeb23ca7c6205feb988d

  • SHA1

    4c3f1ae5b7c5401116fe90fe76ebf320f033284b

  • SHA256

    c9e79c2384db0fc5623535b77c76ab4376cc4b211563c69c693779ee264bba79

  • SHA512

    c7e2c519444a6c0d8db24fd961498cfb52d68bc0549d55de822a8f830dc7b9d5e896d5594cfddb440a86fcf1fa1e4f87f7427d226c9dde3dfa5a3e05f3f37b24

  • SSDEEP

    3072:/YO/ZMTFvU+7IgLhGCK7H+J3EpG9WFzyXPdh3SSAt:/YMZMBvUsIyS70p9/fdh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

new

C2

chardhesha.xyz:81

jalocliche.xyz:81

Attributes
  • auth_value

    0ae189161615f61e951d226417eab9d5

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 5020-169-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections