General

  • Target

    896-127-0x0000000002120000-0x0000000002164000-memory.dmp

  • Size

    272KB

  • MD5

    5d01abe1aeb563ff119454f513db918b

  • SHA1

    13ee1b55a97ac013ef78ea55bdb29e4f75a43158

  • SHA256

    7e2af26086ffdb6f4d44e8fb510e937f021b8958d48df5243c559f7160c4a36b

  • SHA512

    445fc2e5049aaf9d92a946ab855598f9bf09d9f33df927e186500306aa7a12fc477cfbf895bcf0cfcd53fb706821622761c55be4470692a57ac88f54563b999a

  • SSDEEP

    3072:N6j4ELN6FY9C7zhf5hwVsmLoQYXJvLc99no40SEBShApnIlJJg6xNn2pU9f2MKTD:N6jidf5hwlLoJvLcPyShSnIdQv

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 896-127-0x0000000002120000-0x0000000002164000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections