General

  • Target

    800-206-0x0000000000C40000-0x0000000000C84000-memory.dmp

  • Size

    272KB

  • MD5

    487a9a14eec7079b808bb52d6dadc52c

  • SHA1

    d7b08329285beb9421a4cae80181af131d5427e2

  • SHA256

    9661da9d69a08838bc4f98131df050e62222c1af348c4b974792155cf58d8e32

  • SHA512

    87a5fbfc4bf1af687dfd27e4435186dbb0b8530d7471494a082c3110c9b316258cf9f9a0487a92fe8ad1731b4ddf8cb7679c5935914563408e10efc6caf44354

  • SSDEEP

    3072:re6jAELl6FPVCi7WCclyVGgymiyo40Wxreghw5neIu4cDT1:re6jSvqCclCGHmTaghGneI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

911

C2

77.91.78.218:47779

Attributes
  • auth_value

    2f15da81932003536492c52b1803ea8c

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 800-206-0x0000000000C40000-0x0000000000C84000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections