General

  • Target

    2952-163-0x0000000000940000-0x0000000000968000-memory.dmp

  • Size

    160KB

  • MD5

    057db21bbf0a03f3bbbaf3a5abf5d925

  • SHA1

    927fd93cad45d842589b8517b85ee02db851e85c

  • SHA256

    fcb9a2faeb23511984966d70d5e1bf2f30c6b49a5ac708e5cf4dc66416aadc3b

  • SHA512

    a0a9f1c1e96e66b334bd98b1b34877fc9e98b69bd110a694ebe79407e87452284cc390b9d44ffdc254e8a382eb65c53a517429b15eed189c5f142c2131099ba7

  • SSDEEP

    3072:LYO/ZMTFvU+7IgLhGCK7H+J3EpG9WFzyXPdh3SSEt:LYMZMBvUsIyS70p9/fdh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

new

C2

chardhesha.xyz:81

jalocliche.xyz:81

Attributes
  • auth_value

    0ae189161615f61e951d226417eab9d5

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2952-163-0x0000000000940000-0x0000000000968000-memory.dmp
    .exe windows x86


    Headers

    Sections