General

  • Target

    1600-114-0x0000000002300000-0x0000000002344000-memory.dmp

  • Size

    272KB

  • MD5

    830b14a593a986c83caf592c110279ab

  • SHA1

    377f5e2f6ca40cb1f00ecd71a7ac8c9325217627

  • SHA256

    dd9d1d4cebcbbfd4eebc5ba879dd2811da29cd9fab3b23d620dff294f7cf2152

  • SHA512

    5e3a75c13ffed39a109765ba1546ac2f1ccecad02425d55908e99715137071a21fb61e053694adc30d97f43ae5f7f465da4d139d6633870f14bedf09cdbe51db

  • SSDEEP

    3072:N6j4ELN6FY9C7zhf5hwVsmLoQYXJvLc99no40SEBShApnIlJJg6xNn2pU9f2MKTU:N6jidf5hwlLoJvLcPyShSnIdyvi

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1600-114-0x0000000002300000-0x0000000002344000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections