General

  • Target

    1748-55-0x0000000002090000-0x00000000020D4000-memory.dmp

  • Size

    272KB

  • MD5

    339e45b3b0f0b71bc136876d950933fd

  • SHA1

    15a85b03f75f476eeddb08b31e7a609a24717007

  • SHA256

    089a3746f0091553dc6417785bd1c1e500d2a488bd2920408125de062fa09c2c

  • SHA512

    b5072098737db84707adf480f78e546592b23bb3cff24f73975182000ee032a50c1f04ce3f6ee596e62fd35b4bb43283cfa19ec18d5457dc99198c1d1d15fb7d

  • SSDEEP

    3072:i6j4ELN6FY9C5hI6XFMQ6/eHSCJyDCPgmo40z3bzCh6SnPPuwPIxNn2pU9f2MKTt:i6jiFhI6XFMBeHpw4IChnnPPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1748-55-0x0000000002090000-0x00000000020D4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections