General

  • Target

    1224-55-0x0000000002060000-0x00000000020A4000-memory.dmp

  • Size

    272KB

  • MD5

    4875d8747a45eb82bb20525c37e6f926

  • SHA1

    42318b09314e266050b2451077a8fb52dca68d58

  • SHA256

    87cfb1838fd332ecd8c9de55fa78518fbe611ebd7a0f4f98214027d90118ed66

  • SHA512

    297b103cf89971bfa80906501937341b508a0e97541ac791871ed4cd0f849694beb5ade13d8e64ca54fab3e19bb1f2c9185778aef3f5e27c220a20b4380b4cd7

  • SSDEEP

    3072:/X6joELx6GNZCfKpzwR1NJSOdAM+wsjGiVo40P3DYh/LnIBO7xNn2pU9f2MKTV/E:/X6jVj0RgFM+wsjG9YhTnIB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Hacks

C2

138.128.243.83:30774

Attributes
  • auth_value

    d93c40a3415afd4a4c015776bbedd16a

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1224-55-0x0000000002060000-0x00000000020A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections