General

  • Target

    1316-154-0x0000000004AA0000-0x0000000004AE4000-memory.dmp

  • Size

    272KB

  • MD5

    a7fbc8300a13d4b9554ac3c00a915f8e

  • SHA1

    da441870976d85217a1f7f17f8abaead6e98746d

  • SHA256

    72ab305b17caecdf0ade8f541db638ffe19c30b8a85a8062316e74c4dae53ccc

  • SHA512

    4dc6ee1ab91930bbe62ab353e5e109fbd8e1725af3ba062ce515ee12185576396151fdd2367efcd9f002d88bd1ae66614ada76dc0acddc0424033da97d7298e7

  • SSDEEP

    3072:J6j4ELN6FY9Cff3n0sk+wziR/o40DrNwAhFMnImax8EExNn2pU9f2MKTV/wi4lrc:J6jiD30sk+wzYZAhunI7x8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1316-154-0x0000000004AA0000-0x0000000004AE4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections