General

  • Target

    1664-85-0x0000000004AE0000-0x0000000004B24000-memory.dmp

  • Size

    272KB

  • MD5

    d4c306f940eace0323abd89d9da94e97

  • SHA1

    e4d3593a7c1a80f622749de2a345bd968d1f73dc

  • SHA256

    83634cf2ba365de8158755dd912a1bcd5a1d10ef8a49a6d32cee39e5e67932cf

  • SHA512

    081c4c9f914fd592a9985d1a77f63e738172ff82d4e2ded5eee2b3427e77abcd91fe26c8a457bc91132a0ee207fb9ab0ff5d66d6d0b3a689124a594823c406bf

  • SSDEEP

    3072:N6j4ELN6FY9C7zhf5hwVsmLoQYXJvLc99no40SEBShApnIlJJg6xNn2pU9f2MKT5:N6jidf5hwlLoJvLcPyShSnIdZI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1664-85-0x0000000004AE0000-0x0000000004B24000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections