General

  • Target

    1920-61-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    6c520f3242104697149d5f7f1c2a0173

  • SHA1

    c2b2319ae683e9512c3aed74990eb943d36f109a

  • SHA256

    75094a04cacc13521022cc5726cabb1f86ba1ee497da0ac6849ddbc592df852a

  • SHA512

    b96e4ba16a05eb9ec285a6ccc62b1c892742991ee07fafe7e3f43d5c728cdcf18a08a3a3d2aacf5832e7e656cccbd786f17042e551eceaa90cb39837dcaff78a

  • SSDEEP

    1536:9qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2n3tmulgS6p:rEwiYj+zi0ZbYe1g0ujyzdn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

104.167.223.38:42257

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1920-61-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections