General

  • Target

    1480-262-0x00000000049E0000-0x0000000004A1E000-memory.dmp

  • Size

    248KB

  • MD5

    e844b750b8ccb54c0fd50b49573a6ecc

  • SHA1

    553c98cbb61be0fed3aa12ef36b28b696bf80d5d

  • SHA256

    afd075dd0449e1c5c73b5e41c5b0b0d5e833f1ec46ff421d5c3ff4df5f08c5f2

  • SHA512

    6060b37785f39c68d2482e9158242cfcc990a64865415d305dbb989226446bfc4afc3b35c09a59ec93d06817b660be0ee3a55684082a0263b11dd65c355335ad

  • SSDEEP

    3072:HF6joELH6Vt7CmJXBGprAFvLS9Ko40NLHUxhzOnIPrHapwxNn2pU9f2MKTV/wi4E:HF6jwpRGpMFvLSexhanIPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1480-262-0x00000000049E0000-0x0000000004A1E000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections