General

  • Target

    1336-55-0x0000000002170000-0x00000000021B4000-memory.dmp

  • Size

    272KB

  • MD5

    50f849eccd7327d20f0a2460c6ed3ad3

  • SHA1

    280fde1e4ccc9564ca84aaf5aa3d0657e255b5f0

  • SHA256

    3b2d7acd36ec1f0dde436c9e0a5d92f4264de99cccb383114dc9e44f04fc93ca

  • SHA512

    6018ab4cd12a0ba5479bf56f622a9d2bf661711b6ff0796aecc7550776bc57a204faa06acfd1fb1fc70e413e72dc586b9a7b22fe0abada17f197437d30170100

  • SSDEEP

    3072:q6jIELh610pCJpsSYK2TwPsmLoEiO4QDCPgro40JPTfhXXnToUwitzpeoug0xNn1:q6j2VpsSYxTwHLoEis4PfhHnToxitwb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1336-55-0x0000000002170000-0x00000000021B4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections