General

  • Target

    1392-135-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    7ea182dd5d0f90227b8549da1c96bf84

  • SHA1

    409b328a1adc08df1c7b4dc28401692c769e7736

  • SHA256

    472884bad51c4fdd25de7fd2c4aab4966bc5d647002cdac927a9c910db109fb5

  • SHA512

    1f1c05e5fdcb7777fa2ac6e0369db131a2c6d875bf7028e171b95fe00dd3b5ecffd0c1ed8d19ba6eb92dbc48ef901d9541e64e3d37cd3e5fe2c5ab4e2611bca5

  • SSDEEP

    3072:RYO/ZMTFFh+FowLZQxUOZ+LSujzvzWF4nRX4haSSgS:RYMZMBFhWoSQSbjzrBB4h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

USA

C2

109.107.191.169:34067

Attributes
  • auth_value

    efb1b17e182f1e7cdb54a3e91436c48c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1392-135-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections