General

  • Target

    1660-55-0x0000000001F90000-0x0000000001FD4000-memory.dmp

  • Size

    272KB

  • MD5

    8f30ff72514240bc1c3f5ab6d36136c4

  • SHA1

    caf9b10354762e3f95f52588113331108310b342

  • SHA256

    f189bc82d6abdcbca8e4cc91df8e4eebd45ab4e5bfd4fe00b2a26fc1b65de1d0

  • SHA512

    98f1f1c17057991170726fbb9c27ea90a7ecd39977a22f815789d94a4a514e7c84c9a49e7d54d8f64d59f012df09db577209481970f3ba4c8f1c3f5e650a68be

  • SSDEEP

    3072:i6j4ELN6FY9C5hI6XFMQ6/eHSCJyDCPgmo40z3bzCh6SnPPuwPIxNn2pU9f2MKTL:i6jiFhI6XFMBeHpw4IChnnPPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1660-55-0x0000000001F90000-0x0000000001FD4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections