General

  • Target

    1504-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    ca52cd5ffa1e46651d9472e0094b4165

  • SHA1

    bbb2d1ed843a529dc0df2553a34bcfcd1d8a1eca

  • SHA256

    54b75c6ec82473d08d8d716214a4b726e312b9fb93508dc48f16b56f9d25ae40

  • SHA512

    5885eb1fe51b0ca135399238432098a4f434cb6171e6f043e54ad96ad49801365282a05f08e6ac9dbebbaaba5a84bdd080ab2cc63ebb5b6fc8333e354c294920

  • SSDEEP

    3072:YYO/ZMTFVh+FowLZQxLwN1BZJ/3WF5yRXnh8SSkQ:YYMZMBVhWoSQ5k/3jBnh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ritchshit

C2

94.103.183.33:80

Attributes
  • auth_value

    98c1a18edcc6e04afa19a0ee3b16a6e2

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1504-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections