General

  • Target

    1740-55-0x0000000001F00000-0x0000000001F44000-memory.dmp

  • Size

    272KB

  • MD5

    d8a7228bf84d4c749dea873d62c48821

  • SHA1

    23bd4c2bc7edc15e99987ffe9669bd632f8e42cf

  • SHA256

    d6fce38f6b45c637997af95e306cd786a7f41509876a357828db3a3c598191c2

  • SHA512

    3468856bd1221ab4df7b61ee15e729e7c5ea20f570fdd106957e77e1c9f584bd5cd1ee11cd5e195127ae9074244c8408f82c39cb30b20ed40d9152e295960712

  • SSDEEP

    3072:i6j4ELN6FY9C5hI6XFMQ6/eHSCJyDCPgmo40z3bzCh6SnPPuwPIxNn2pU9f2MKTt:i6jiFhI6XFMBeHpw4IChnnPPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1740-55-0x0000000001F00000-0x0000000001F44000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections