General

  • Target

    1584-153-0x0000000006EA0000-0x0000000006EE4000-memory.dmp

  • Size

    272KB

  • MD5

    6d8d8c3034bc7133997f1e8167d9a832

  • SHA1

    eafb5645736fecb2371726cdd0a60443a05174a5

  • SHA256

    29afe7ad5c2079d5c441817de623867f2c76df18d7bade7c8b5391fcc8b19ebb

  • SHA512

    8ecd05528859ff5b81860a54fec74c0b547ad7d2930b7cd9362733d9f9ab1d6598a4d3881804b13509c8d4d3461220247af515415313c6df18ccbf557c1247a7

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKA:96j+GosvqFwtLo0yr3QhZnIjjJn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1584-153-0x0000000006EA0000-0x0000000006EE4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections