General

  • Target

    396-208-0x0000000000610000-0x0000000000638000-memory.dmp

  • Size

    160KB

  • MD5

    3d3861f9464ca1e0fcb79c0d7dc62e9e

  • SHA1

    54787bdc9cee1c10d2b69a032c6056f4856d747d

  • SHA256

    8aeba070434b175b3532ba6ff790c2aabca3e40ddad18be9d6ce65354cd6c9c5

  • SHA512

    23c7828465d504bca2e8d74adcec92df15b27efbcf39cecfeecb3c927ecfe742f001c98cfcabd129f92ed0b3fc87f13bd8a87e5886ab4c153f0c541db6686f27

  • SSDEEP

    3072:UYO/ZMTF8r+sIjLHyGkV7FzsEWFqygXShySSwU:UYMZMB8r3I/IoE64Sh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

a4

C2

65.21.133.231:47430

Attributes
  • auth_value

    770e1e7fb0781851d5e2e8f9e720e0dc

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 396-208-0x0000000000610000-0x0000000000638000-memory.dmp
    .exe windows x86


    Headers

    Sections