General

  • Target

    2032-66-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    f40578f4d0fbc88861dd0ffe7de0a25e

  • SHA1

    9fe370eb62649922b673b197fb9a0aab3ea566e8

  • SHA256

    4eaf85921f9c98f3455157e962f8d7f5209dd39bcd34228a1651d5b41ddf0ece

  • SHA512

    2413390d423f3c265eed9972aa8c35e2bf5582f13810d446a8d3a084d78825af06f5bbf9f558bc1e2898c30e2871cdae5db181c9587c345cb2a18ffe1b12e0fb

  • SSDEEP

    3072:4YO/ZMTFHX+2IQj/93IB8JWolWFK/RPAhcSS8K:4YMZMBHX1IQdIkBpAh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

11-25

C2

172.99.189.117:44670

Attributes
  • auth_value

    f3754aeb17f33c672540bd6f71407965

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2032-66-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections