General

  • Target

    900-105-0x0000000006E40000-0x0000000006E84000-memory.dmp

  • Size

    272KB

  • MD5

    efa67214e93dfc12da23eda4c6d32dce

  • SHA1

    bee1268f5c80699b7c436669ca609d0e7c86c835

  • SHA256

    0c577ed379643e51494d329112a473872b9f000b2b1f955fcd1545bdf5e7ad68

  • SHA512

    cfb651bb8c28fbc981818f9d0af124f513c59c7d8ba444de9c5e2f131b9a7b60d663bcefaba609c0b79be35696b5394fcaff0ce63a66c303d567eeaacb5b88ec

  • SSDEEP

    3072:F6jYELp6VFxCjegd9zQRRa0TwOkNwZsmLodSxm4miwo402otLh3An87q3xNn2pUa:F6j+HM9zQPa/5NwpLodSdm2Lhwn87

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

milaf

C2

193.233.20.5:4136

Attributes
  • auth_value

    68aaee25afe3d0ae7d4db09dea02347c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 900-105-0x0000000006E40000-0x0000000006E84000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections