General

  • Target

    1688-55-0x00000000022A0000-0x00000000022E4000-memory.dmp

  • Size

    272KB

  • MD5

    d4078c13b6654076037f7e47115eb303

  • SHA1

    ab9567437196ff819df1705f2f5f3dfd3b13b053

  • SHA256

    77fa734b8b2fac56c1c9a21f9df0060930dc6be2ae7680b53747c3f7b958bc0c

  • SHA512

    de8fb1c2e84c70ae4c7e7696de96f103451e941448507201b1465ba205b7aaf7fe27963eedb815dccc2ed74cdbb1e2de39fc68bb16b7d21a214264f42d63d96f

  • SSDEEP

    3072:2i6jIELf6FDTCK7nKFl5/epmUgJiio40hab7hzPnQ1MxNn2pU9f2MKTV/wi4lr5k:2i6joCveppgJh7hjnQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

bilod

C2

193.233.20.7:4138

Attributes
  • auth_value

    407a8c8d5a1f9a3348afc8c6b0155512

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1688-55-0x00000000022A0000-0x00000000022E4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections