General

  • Target

    388-62-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    f08e26d478abba5dd754de2a882db73f

  • SHA1

    389d4832cb61367120a60895af807e3ecf354f66

  • SHA256

    b4cf495db44890c15414f224f9f51ecee94218d63da540af6e8c7d5b2550357a

  • SHA512

    0c8c04fc12999ca78498acd23b42eb7fdb4c60a377b2d4dce52ff74b9473a32c93aef6d37e3a89e971738c718988b2d802f11fcc2051a9bafefeb452ebd1afc3

  • SSDEEP

    3072:cYO/ZMTFBtgoYzdxHIfk2kTHtWV0DF/yRXLhDSS:cYMZMBBtgomRIfk2kTHthwBLh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

167Captain

C2

88.214.25.15:39933

Attributes
  • auth_value

    857c3103842fe8254bfda680d43ec2d6

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 388-62-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections