General

  • Target

    1668-96-0x0000000004960000-0x00000000049A4000-memory.dmp

  • Size

    272KB

  • MD5

    1399aba02ea656aebbd197b3d8db044c

  • SHA1

    d172f959a7f438c1f2f90cfd7223cb8da1b27f1f

  • SHA256

    d408fb70ca2fced368a3b2ef66a2a239f8789c2aa450b07fce257aab8689c95d

  • SHA512

    cdafc481ed1c435b925961fe264111821d53b74991f54898b2a753517b69d34dd734420f5abea0f26e278c47ce89a2a461a89199a0896190a221460b45aeb6f3

  • SSDEEP

    3072:H66joELH6Vt7CmJXBGprAFvLS9Ko40NLHUxhzOnIPrHapwxNn2pU9f2MKTV/wi4E:H66jwpRGpMFvLSexhanIPr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1668-96-0x0000000004960000-0x00000000049A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections