General

  • Target

    2040-63-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    8a488b52c610e2c29cd30abdd46734f7

  • SHA1

    97f8d31a6b8002b04ca3241841ef56ce770ab43a

  • SHA256

    c2beb51e0d9552d5fb7f2e20c9189d7dc42e364fc69ba093c9668d7ea0f19532

  • SHA512

    5e42521e7a33aef242d09855b92a618963a95c559cf40d08155b561fa550191adf7be6aa2108b5c93af868d7c00136b78dca60d572fbc31a40d897414ee86c39

  • SSDEEP

    3072:cYO/ZMTFBtgoYzdxHIfk2kTHtWV0DF/yRXLhDSSwr:cYMZMBBtgomRIfk2kTHthwBLh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

167Captain

C2

88.214.25.15:39933

Attributes
  • auth_value

    857c3103842fe8254bfda680d43ec2d6

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2040-63-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections