General

  • Target

    240-55-0x0000000002070000-0x00000000020B4000-memory.dmp

  • Size

    272KB

  • MD5

    b535d8278050a027bcf5b147a788e05e

  • SHA1

    d9b3040e8ebb9e54e52f01a8320ec5a5369b0e76

  • SHA256

    35fa1a5210380ffd8743dbb66370d5eb85260a6a9e76316505de24cb775c0ac8

  • SHA512

    2f7d588cd208df5c2c0fc2a39d3801b5bea56e83b56b7476d096aeabb5bb25ba081b1a4a8a9003bc2010672c9e87da64eca587ec21973730c3a10c79064bc461

  • SSDEEP

    3072:i6j4ELN6FY9C5hI6XFMQ6/eHSCJyDCPgmo40z3bzCh6SnPPuwPIxNn2pU9f2MKTS:i6jiFhI6XFMBeHpw4IChnnPPromyB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 240-55-0x0000000002070000-0x00000000020B4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections