General

  • Target

    1552-56-0x0000000000080000-0x00000000000A8000-memory.dmp

  • Size

    160KB

  • MD5

    8c632d120b1d65e79fca8839b7e8e8a2

  • SHA1

    666a6b1763acbd7873aa57f9261b4583f5041729

  • SHA256

    200f8eb953eddb522a13204ca432e768c67e17c085444906a198c27502d633ba

  • SHA512

    504d9fcdcc745123bfc9a30c2b6bb7981a94b1efc77243cf802a0876ddcf0b9a1dd095d0928f9e6645e97f575870def6f2d6b927317371d6d6ea8af97a1353f7

  • SSDEEP

    3072:qYO/ZMTF9J+0oA7hZRXoZmUwQ5dLyWFz6RX2hXSSwr:qYMZMB9JvoKPE5dW1B2h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

LogsCloud

C2

151.80.89.227:45878

Attributes
  • auth_value

    3122c177d4109932092e46f83a2e0f2f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1552-56-0x0000000000080000-0x00000000000A8000-memory.dmp
    .exe windows x86


    Headers

    Sections