General

  • Target

    1596-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    9e2604670a526fc2afe0c8d18eb42783

  • SHA1

    9997df685d9a813e09bc67b9539c681935ff9de7

  • SHA256

    6e6f8554f6a2b0be672733cb0f1bea6c54158fbe6299754c09d8019f132bc231

  • SHA512

    4faf381118a60679cc6d5c913fe91eff5394c0e3ab00afc18ee8b3e365d79dc7fdbd2b191bc94d85e59002d3e492a91a8d0da2c4ea3aaa5ae1232a26270f41ac

  • SSDEEP

    3072:xSYEAuDeXAEiXj0YAFwhzFjwWQGh6yfE:QYEgXRiXw2A3GhX

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1606560899

C2

37.220.87.83:25717

Attributes
  • auth_value

    e623c8aef7fa8031b5dc2785362f1a0f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1596-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections