General

  • Target

    2016-55-0x0000000004740000-0x0000000004784000-memory.dmp

  • Size

    272KB

  • MD5

    366a893f0b5fd6efc9fbc65674517132

  • SHA1

    af1996999adba9111eb4b33c181af1868e84ae87

  • SHA256

    dc7b1b803ea868a4345607789695a99b35446b105c8b6db32edec1f1109c7737

  • SHA512

    02088b76e9501ff89fbdda0ccfa35577cf9ca5415bbee699de4c7154d7e5fcb3958281ce17521593b95d12a986e1ec36c1f1683fcdac3bcfd77cb150cbd06012

  • SSDEEP

    3072:e6jgELd6mSNCBErGYJ5SlGmvLS9q6o40TsrAdhZsnv6cxNn2pU9f2MKTV/wi4lrc:e6jpvEr7qGmvLSoNdhang

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@2023@New

C2

91.215.85.155:32796

Attributes
  • auth_value

    0be5b9b84cd5b707e91a48e341e3f7d7

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2016-55-0x0000000004740000-0x0000000004784000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections