General

  • Target

    1896-139-0x0000000000B60000-0x0000000000BA4000-memory.dmp

  • Size

    272KB

  • MD5

    93b74a3f88da92890b8f2a1f8176dfa3

  • SHA1

    f101bff4387512cbaf2fce649e0c93e7f4d17bb6

  • SHA256

    1d9ede6b0896968c714bf398ab7af739b563dd2d4b27a82aeadc6514389b2b19

  • SHA512

    d5e10b4cf982801031e8bd402ba547cca9c4492fa69db583f00e08fc080f899a8387ae6255f6080a260d6b799ec9971794494a285a73cf19627c6da8851ff307

  • SSDEEP

    3072:KY6jYELD6F+PCD+uP4HNqWX+H0Sk+dMiMVo40V+5UwahQLnvGUQJtw/axNn2pU9J:KY6jsP+DHNKUSk+dMtT5DahwnvGUWw

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1896-139-0x0000000000B60000-0x0000000000BA4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections