General

  • Target

    1084-140-0x0000000004A60000-0x0000000004AA4000-memory.dmp

  • Size

    272KB

  • MD5

    69dbb3a2cd50dbf93f4fdf4bc2b71766

  • SHA1

    618fa0dd8a851dca0d2d7f109b862ec9e6f8a111

  • SHA256

    d0a3cfe7061f254607515ab80d602497a0b9897c7062cab542bb94231e9d819a

  • SHA512

    c5d2f5db6d19ed8e1207cd051e03190ccb13eb551e878c053d1e8fbdd5a9e7f73feed53b6086e8e784bf65e72f12ab950c779301f46eb4bf6dc86e44d1fb9e79

  • SSDEEP

    3072:KY6jYELD6F+PCD+uP4HNqWX+H0Sk+dMiMVo40V+5UwahQLnvGUQJtw/axNn2pU9J:KY6jsP+DHNKUSk+dMtT5DahwnvGUWw

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1084-140-0x0000000004A60000-0x0000000004AA4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections