General

  • Target

    1764-154-0x00000000031D0000-0x0000000003214000-memory.dmp

  • Size

    272KB

  • MD5

    7ef23dc583df269803beeecc381df4a3

  • SHA1

    545f250cc49b1b8c522a69b146881c1b86ba17e1

  • SHA256

    ad874c9d61520080f770d37db53b9dc2857556e0b92ece75d3befdafea3f91f2

  • SHA512

    f8b7fda88010d7a92c29681d869ec92a0f386e18ca9400935d6ca15a2e125bba8fc39ebd3c82c55f2f68d7f05636a9a8f6778e2277867b41c77c235cc30a1d7c

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MK:96j+GosvqFwtLo0yr3QhZnI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1764-154-0x00000000031D0000-0x0000000003214000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections