General

  • Target

    684-3130-0x00000000026C0000-0x0000000002734000-memory.dmp

  • Size

    464KB

  • MD5

    cb1efe2022646e7fcc0bfa66aaae1325

  • SHA1

    c75385ab2ac3573015ebbec4992cf5785208f095

  • SHA256

    87707a5eb60b7188dae09b52b088bff8ecfdb8edf8f344f3522ba958b2c0179c

  • SHA512

    40f4560365c41c9efb6de88f3157cee8de4ecd88acc5a4e02a2459aad4c95aec1289e457a24cdf6f66aca3c94f4d7ffcb2ac5f18ebc4ab79dffc6c9caa163741

  • SSDEEP

    12288:280gKe0A0PltOoPmL+uD417OMUhSSmNM:H0PltweM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Hack

C2

154.17.165.178:10377

Attributes
  • auth_value

    50233687e98ee274b44a32fcc741f9a4

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 684-3130-0x00000000026C0000-0x0000000002734000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections