General

  • Target

    1020-156-0x00000000049F0000-0x0000000004A34000-memory.dmp

  • Size

    272KB

  • MD5

    5f61d16cc519f65e1406841311764ea1

  • SHA1

    5303bed87bb9feab161517ef48bac7603d21e2d3

  • SHA256

    cacca35bf04cd94cc84eff8f128bac8e7f9d73ed54b7831eaff9039058544178

  • SHA512

    d16afa5189d9eeba6997aae97871ef1261e58a57d083ca434b3bfd6022754218b335bf832ba6b8ac89a478a029fc9760103a1a50e53885f7ce6b2e5a0d7a7983

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MK3:96j+GosvqFwtLo0yr3QhZnI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1020-156-0x00000000049F0000-0x0000000004A34000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections