General

  • Target

    2840-167-0x0000000002720000-0x000000000276A000-memory.dmp

  • Size

    296KB

  • MD5

    4ea27b03c036852d5cc39189cb0f7382

  • SHA1

    d1e62d064ab310d25698ee3fd3e9d91e65ea1fd6

  • SHA256

    2217a58917ecb0ea70111d3dc2d8bed5e082dd6ab7b5e000122cb53df13d4db1

  • SHA512

    6aa460de8a4d7e18ada40eaf6ed0376b93aa5c7adfb2f59d87425d834d422d81cc02754696ab3e4d573fd6f29832460aa153cf3a076a16c8d56d4c25f7c0fbdc

  • SSDEEP

    3072:A9OOHTpe6UClmb/PoGRlf1/4iAriYNgcfsjen03frS0krzpiuE:K9UClQPLRlf1USfO0Oz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2840-167-0x0000000002720000-0x000000000276A000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections