General

  • Target

    1324-59-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    f49d1fd63d4989d35b7f9a121ebce52d

  • SHA1

    cf006d41ce12ac4affbae6be14522ce30014f124

  • SHA256

    f53cc15953654a8f635b2715fb53834d264e93ea5de1a32388cd2d863528ec5b

  • SHA512

    a8c94be4d9a484ab59336c7109dafef94ab67dfe2b3bef50f6ee125fc875a2eb74a9de236b2470fddb569b621224687457925333bb151213c97c61ac5d016f70

  • SSDEEP

    1536:PSGETCd7RendD8iFihA6e/ZzNNPbvnASSyqHXOKXfAUOwh/buc+mMPjWQB0wueiJ:KGEGuD8iFidSHvcyrYAFwhzFjwWQBhC

Score
10/10

Malware Config

Extracted

Family

redline

C2

168.119.228.126:11552

Attributes
  • auth_value

    4d265d97daa689f979857b5ff624933b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1324-59-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections