General

  • Target

    1436-58-0x00000000020D0000-0x0000000002114000-memory.dmp

  • Size

    272KB

  • MD5

    5216454829d0c2d69d4f6328cacd5bb8

  • SHA1

    64d684c9a36da62e74989c312038e0e0a787eb09

  • SHA256

    ad8cf1ace9c825e278bd0bdbe005481919d56a44f8a8be6a79ca4f3fa1e8f086

  • SHA512

    d4075ce15edef9c109bd0b82229f924c5b4628185ac9fe7447629247c21b504a027c7aea4f37ea42c1f92845fc439e250210ba379a6d47c6eae39cfde6e32a20

  • SSDEEP

    3072:e6jgELd6mSNCBErGYJ5SlGmvLS9q6o40TsrAdhZsnv6cxNn2pU9f2MKTV/wi4lrE:e6jpvEr7qGmvLSoNdhan

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@2023@New

C2

91.215.85.155:32796

Attributes
  • auth_value

    0be5b9b84cd5b707e91a48e341e3f7d7

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1436-58-0x00000000020D0000-0x0000000002114000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections