General

  • Target

    1392-300-0x0000000004930000-0x0000000004974000-memory.dmp

  • Size

    272KB

  • MD5

    16a9d4d56ee3020440ede5abbc9a6a81

  • SHA1

    1cd408fdb82b6fb199931f2855b2f6df10aee7a3

  • SHA256

    a973a3973718f84c7e347a08ed45497b0139563a977f095083972b9f2af912ab

  • SHA512

    4049f329ac7b69141e3640e63f869e44dd9d9476c91cb5f309c1477871280bddf1daa5dcef0d8ac4d14849aca6bee47bd17b2b72e75df4d952e5a7c00a35f6ef

  • SSDEEP

    3072:V6jgELP6F6DCnuYFQB+e/ewGsvLS9Eo4012OChcTn1Xz4xNn2pU9f2MKTV/wi4lm:V6jQyYgne1svLSfCh8n1X

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1392-300-0x0000000004930000-0x0000000004974000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections