General

  • Target

    2028-56-0x00000000005A0000-0x00000000005E4000-memory.dmp

  • Size

    272KB

  • MD5

    0b1122d4d12b014ca0c1d555dfbd0196

  • SHA1

    379c6b8afd1837b5c8ca8f87f7d8f2690cfb5602

  • SHA256

    595c6aa670638a6a421e7170c9b141f16c56fe726a03ddf6e597259ba87e5a38

  • SHA512

    790cfcebd5a42832b6f71798a7cc98337159e686d8572c3796e196139ca2cdec7174f438573ce8b8890c66ac4ac5cd2c96a1666d2e63df2914638717a99ff17f

  • SSDEEP

    3072:v6jIELh610pC8pGLIqQdhPJLv1HZGqYibo40yOrs7hpCniTGnCzHxNn2pU9f2MKS:v6j26WrQdhhLt5GqY147hYniSnC

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nokia

C2

31.41.244.198:4083

Attributes
  • auth_value

    3b38e056d594ae0cf1368e6e1daa3a4e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2028-56-0x00000000005A0000-0x00000000005E4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections