General

  • Target

    1280-96-0x00000000032E0000-0x0000000003324000-memory.dmp

  • Size

    272KB

  • MD5

    be38448213ee29a65696a3e48525af32

  • SHA1

    c7a65ee45b8372284c502e43b3bea3d769e2a742

  • SHA256

    324697b32f5f168577a0b2a1d97647b7d77d6702c8b6d8c9376bc235d1c88459

  • SHA512

    1bdfd11b35d69dbb0f89fb89dac895437138c38ff26cfe0e7b135cf3a00afb8a74d67b78078c6a900f8247b1370d8ab6c0c7fc3e5a0638db57259c080109d247

  • SSDEEP

    3072:H66joELH6Vt7CmJXBGprAFvLS9Ko40NLHUxhzOnIPrHapwxNn2pU9f2MKTV/wi4E:H66jwpRGpMFvLSexhanIPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1280-96-0x00000000032E0000-0x0000000003324000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections