General

  • Target

    1168-86-0x00000000023B0000-0x00000000023F4000-memory.dmp

  • Size

    272KB

  • MD5

    a8d18e01382217fb3fbdad57ced1b38a

  • SHA1

    335afef1e8a9a1d95e3623c5f8cc51511b75759e

  • SHA256

    1e172bcb45c627e84e49b996130711b0d9c417980a41cd467dde2a36d3f0d4f8

  • SHA512

    ee8047b9b6e7d40530fb4a0c1573228703d98578148223c7eba8781ff1ed7e6a250801588b9e022b783120922430605466dcb9551955fea8503d45a70ea93674

  • SSDEEP

    3072:N6j4ELN6FY9C7zhf5hwVsmLoQYXJvLc99no40SEBShApnIlJJg6xNn2pU9f2MKT5:N6jidf5hwlLoJvLcPyShSnIdQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1168-86-0x00000000023B0000-0x00000000023F4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections