General

  • Target

    1536-57-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    cff82663e9ca1f7dbefe198e52929300

  • SHA1

    f8affcb5fb28ba0ace6486946a807b92ebd0365f

  • SHA256

    d6ddf66185922867d0ab6991f3579f040b2a4d7f7360b41846456c4f8c178588

  • SHA512

    152eab277c2538e170f839a2a1bfaa78dc1d9ecf3d68c0e883fd43008de17ee463eed75fad718e29df97ab0bb2524615ea5c534595b5af209e1c149c8a61439d

  • SSDEEP

    3072:qYO/ZMTFEF+WMQ7ELXg7waPk0G5WFp0RPahKSSb6G:qYMZMBEFhMTjgsD59pahl

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@Norka16

C2

79.137.204.112:80

Attributes
  • auth_value

    3fd68ba186faa3cfc903b8bd9928c0f8

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1536-57-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections