General

  • Target

    524-155-0x0000000004730000-0x0000000004774000-memory.dmp

  • Size

    272KB

  • MD5

    2bc777ff05325b850a218e17d5fbe2ec

  • SHA1

    9a8a058e6ef21c85a6363b8c7b0d27c96b50fe8e

  • SHA256

    6e7a7371e044ec8cabf86ba6db7e7f2a6deb5bbda3f4cfc15528c125076bbfb0

  • SHA512

    1c34da165d7e04d62608f1745d805a896520f7134fef0d729b69caa37ad783777fb8f35bd37e96c6d028fb26f547eea478e1d03500b31d14e3241ea7b3fcef1b

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKS:96j+GosvqFwtLo0yr3QhZnID

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 524-155-0x0000000004730000-0x0000000004774000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections