General

  • Target

    4300-144-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    3706d3b70014c09fbdfd7b27e234198c

  • SHA1

    9d07f6194ec5679585a0bf34f8785e168b78e7af

  • SHA256

    2208e3145499ea0f1ad8f74c0535af5fdd34ba2c84bb9bc9a4c0ee9f34660f90

  • SHA512

    a51dd19757e947d59db29e77a8155dd3ea0136e727732a7960564e92161683c463873f55a59f16d074426eb0c75caa7ba3c7146415bb8cf57b43b249ade39f2f

  • SSDEEP

    1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed25tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdpY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Muckk

C2

3.66.213.216:60782

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4300-144-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections