General

  • Target

    95300-60-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    3df481818a1a651c5a046d703f4fcbad

  • SHA1

    2d49f2fe2b64e451806d5c9a32140e018fde0b76

  • SHA256

    b2f057e4af75ec1d3f0af86e67c3bd3e1fa5251a06fb2b5d70337d746297854d

  • SHA512

    ec2e03a5bda9f5b683ebe304b9ec5372ec01bfbbda8dc59cc7ebaf64ca5959359b1770153f61197175873dc4e88e0a72988534de3d336944ea758042062876d3

  • SSDEEP

    3072:NYO/ZMTFyh+FowLZQxKvdHm208jWF3yRXCh1SSgN:NYMZMByhWoSQc020WJBCh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

95.217.102.105:33508

Attributes
  • auth_value

    d1ba4561de5eb84044e2061ff7d1423c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 95300-60-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections