General

  • Target

    1696-56-0x00000000023B0000-0x00000000023F4000-memory.dmp

  • Size

    272KB

  • MD5

    acd0fddea0756ec4856440c9545b9b29

  • SHA1

    ea2a4ec35596b58350e6610d55ea1d9c40ef5de7

  • SHA256

    4e53dd4a10023e535f78cf91379fea4c6879ce8b3afa749b1661e2ace1ff1526

  • SHA512

    ab2171f898a4074f6f28d0be1d8c9245b61167a53a5c2c1cddf702b5bb0b32fe2bced43822b91745b897f31e733251d65fae3cc5a5d124aed7d28e9878a2cfb1

  • SSDEEP

    3072:kj6j4ELH6Vt7CjTqxKm0dk+ZxDCvgHMIo40pwVYhdrncIVf6xNn2pU9f2MKTV/wc:kj6jgwcKrdk+rYYMCYhpncIV

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

zaur

C2

62.204.41.170:4172

Attributes
  • auth_value

    8f24dad16e6d64e3d692e48d05640734

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1696-56-0x00000000023B0000-0x00000000023F4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections