General

  • Target

    1320-55-0x0000000004830000-0x0000000004874000-memory.dmp

  • Size

    272KB

  • MD5

    7afbc3aee4d7da624aca4399255934cf

  • SHA1

    8e81c1260020559995e8dda953b3ff3c7ec61c9a

  • SHA256

    e52cb74876dd0c71cb9203fea56e5e5b5018e549818951d2e4045dbcc382029e

  • SHA512

    1c1816d97183b9dcbc363dd9960691d800683ffd76dc21a7c61c560b7c3bcdc657b84a29b540f2717189c6cfe55bf1f21b37841d0ad10a4d4aa6bba1fa9c50da

  • SSDEEP

    3072:D6jgELx6GNZCMS5qf0Qk+QDxvLy9KaLo401yhLhsZnnEhxNn2pU9f2MKTV/wi4ly:D6jdF5sQk+QlvLyoaLLhCn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

new

C2

176.113.115.16:4122

Attributes
  • auth_value

    0ae189161615f61e951d226417eab9d5

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1320-55-0x0000000004830000-0x0000000004874000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections