General

  • Target

    1972-55-0x00000000047D0000-0x0000000004814000-memory.dmp

  • Size

    272KB

  • MD5

    c7df82e9707198858726046eda8e9626

  • SHA1

    60e4c082b94948835c775fcab62bb7b1db36bf02

  • SHA256

    3904397951de83f5cc35ec17d878af414aaf9cd949267825d2855b34c2d4ed4c

  • SHA512

    a0733806a4560bb17020f45649a8c6c18916d38ab60b1a92512272b6c8530417053d9748955195b82f0be0aaa4d1cab8614463144bc1b82323842997040a227d

  • SSDEEP

    3072:D6jgELx6GNZCMS5qf0Qk+QDxvLy9KaLo401yhLhsZnnEhxNn2pU9f2MKTV/wi4ly:D6jdF5sQk+QlvLyoaLLhCn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

new

C2

176.113.115.16:4122

Attributes
  • auth_value

    0ae189161615f61e951d226417eab9d5

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1972-55-0x00000000047D0000-0x0000000004814000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections