General

  • Target

    4472-146-0x0000000005060000-0x00000000050A4000-memory.dmp

  • Size

    272KB

  • MD5

    44216794e94dc1618d83ca4bbccf2190

  • SHA1

    20cde3573cf77c8da6002125debe8a3bb03fe0bc

  • SHA256

    ad98bf986303ce30b79550177bae6fec1e6728bebecf739d9778659619020caa

  • SHA512

    ff1e11c2f1beb731a18d137e0908d1447549c2501899540d2b835cbf0a4f5145bcc819618343c32324b55f386140f48748ffd137cc491adb5f238fc745f8b831

  • SSDEEP

    3072:V6jgELP6F6DCnuYFQB+e/ewGsvLS9Eo4012OChcTn1Xz4xNn2pU9f2MKTV/wi4lm:V6jQyYgne1svLSfCh8n1X

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4472-146-0x0000000005060000-0x00000000050A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections