General

  • Target

    848-55-0x0000000001EE0000-0x0000000001F24000-memory.dmp

  • Size

    272KB

  • MD5

    4638fc9d6b2265527115b9b64e3dc7bb

  • SHA1

    c13237452709a3b678e53fc05ec2b668b0c49424

  • SHA256

    7cff491906df12d241390916d8c0828d46bc97210d3005755c7adb082498f9f4

  • SHA512

    92aadc4e3a16100e7af75b4bf3316d8cd6272d149a5ca433221d5b747316f11850142a9ebdd1f4bf6d03c2b23d066ece2b2d1af84c63945ee56049c2bbfdf1a9

  • SSDEEP

    3072:e6jgELd6mSNCBErGYJ5SlGmvLS9q6o40TsrAdhZsnv6cxNn2pU9f2MKTV/wi4lrE:e6jpvEr7qGmvLSoNdhan

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@2023@New

C2

91.215.85.155:32796

Attributes
  • auth_value

    0be5b9b84cd5b707e91a48e341e3f7d7

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 848-55-0x0000000001EE0000-0x0000000001F24000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections