General

  • Target

    1504-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    5646094f6711d338e31013869157ba45

  • SHA1

    756b77ff13d661b2b00ffdc4f5e220c205b80c02

  • SHA256

    82c62dcbb39f123811349be057f898b10b71fc6ed44b1505825227e15222a3ce

  • SHA512

    78a5e937b7faa79a04012b2501849b5a2710b3151311d93c90716e4dfeee8b7a8027df9f9d7246e672e6b0dea221d564d61bd019cb6c3ead207c210aecbeb09e

  • SSDEEP

    3072:QYO/ZMTFpV+6Inzat4azAFI5HawWFRyRPAhaSSEU:QYMZMBpVRIGOaBHD/pAh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

richdaz

C2

94.103.9.89:80

Attributes
  • auth_value

    f4bcf82f8d243cc69348f1a4e718a07d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1504-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections