General

  • Target

    1348-248-0x00000000071D0000-0x000000000720E000-memory.dmp

  • Size

    248KB

  • MD5

    428594011636477621b6c4613e0e8229

  • SHA1

    00563c0f531fd15ee546785b573962d8bf7e1af1

  • SHA256

    d6734d2830f1a2e00cced8ef65c8d583432b47f4c7181f076580a9a38a250dd0

  • SHA512

    b597cbb4b4b44f5314b83624da2f8a6bbb1b8400eeef6303e2d0826848cb00b1d00656c4e175a2d01d62316c44448e44b36fdc28a5145d61efe2319445a937ed

  • SSDEEP

    3072:H66joELH6Vt7CmJXBGprAFvLS9Ko40NLHUxhzOnIPrHapwxNn2pU9f2MKTV/wi4E:H66jwpRGpMFvLSexhanIPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1348-248-0x00000000071D0000-0x000000000720E000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections