General

  • Target

    1992-58-0x0000000001EF0000-0x0000000001F34000-memory.dmp

  • Size

    272KB

  • MD5

    e64627515322df60b614d60ee9e06386

  • SHA1

    4b0b47fbceb66c467cf06f690bb20321f67b4393

  • SHA256

    3ad182c9e4d776ff1b367cb6ee658a7e2685b69e8fd88b16d4506ae2c079168f

  • SHA512

    a549122f6144ea11b83d279cead9c4f71c1d38189e54f24e77658cb7056a36b7072dc3b1d42449fcb8303e0da75967be4a729564c93f8e2779da9cd8d400a7c2

  • SSDEEP

    3072:i6j4ELN6FY9C5hI6XFMQ6/eHSCJyDCPgmo40z3bzCh6SnPPuwPIxNn2pU9f2MKTt:i6jiFhI6XFMBeHpw4IChnnPPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1992-58-0x0000000001EF0000-0x0000000001F34000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections