General

  • Target

    860-154-0x0000000003160000-0x00000000031A4000-memory.dmp

  • Size

    272KB

  • MD5

    6ff38fe5983d09742951850603d442dd

  • SHA1

    c3ccb26346b5e00348505d117959417b03aab8ab

  • SHA256

    c16db2e7922bf516b0b687b2a9c5bd187050dd95bc2d88643f47391983e74bd5

  • SHA512

    616c52a68511c8be2a952ee4ca027032d13125570053447979f636e0300061249fc2048859d58bff80f342c3136b26de2838be7b979131354b936ce57065cce6

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 860-154-0x0000000003160000-0x00000000031A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections