General

  • Target

    1652-55-0x0000000002160000-0x00000000021A4000-memory.dmp

  • Size

    272KB

  • MD5

    be7391feb1b71dd163a292947402a783

  • SHA1

    1ae1320518459032cbb6343f645beebc9a0ba4ba

  • SHA256

    2b6d7cf3da41ebce991dcb611d7117e98014edaaebeb7b09ade4df46444cc61f

  • SHA512

    38c6741cdbb6c3f7df9b1ddf6f1ad284bca86acc135e815b058700d99f66d83f6c78f9febdd70396cbeb706a77faaba3e05ff7fb61bfb184c7ba300056c9af7a

  • SSDEEP

    3072:i6j4ELN6FY9C5hI6XFMQ6/eHSCJyDCPgmo40z3bzCh6SnPPuwPIxNn2pU9f2MKTt:i6jiFhI6XFMBeHpw4IChnnPPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1652-55-0x0000000002160000-0x00000000021A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections