General

  • Target

    1976-55-0x00000000020B0000-0x00000000020F4000-memory.dmp

  • Size

    272KB

  • MD5

    87d2050f22ea7516d447f538c344d674

  • SHA1

    7546189cca5bf7c55c7407024cf36c2b3c111435

  • SHA256

    46aec25f7cc0dc143ce4a6872fc409213b86c76d112e5a704d782064552ac197

  • SHA512

    06c832d80099a091365fd55fa7989b51ff8d34b4aa385c33d82b986d6245a9977a4409fed6d7b93d51241e992bc96f38dc099e08c3cb8d982e8f57ccec109ea7

  • SSDEEP

    3072:i6j4ELN6FY9C5hI6XFMQ6/eHSCJyDCPgmo40z3bzCh6SnPPuwPIxNn2pU9f2MKTt:i6jiFhI6XFMBeHpw4IChnnPPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1976-55-0x00000000020B0000-0x00000000020F4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections