General

  • Target

    1100-138-0x0000000004C10000-0x0000000004C62000-memory.dmp

  • Size

    328KB

  • MD5

    9a1f3138078b734751ce92d70fcf96cb

  • SHA1

    b52f912638a2c9f54b4312dfb5e32f7014886a5f

  • SHA256

    b8fd8dd7615c60deff77a444ff85b89088622bade592c402e353c09e12f78fad

  • SHA512

    0d9cba89a3062a613f6ae84329aa4b3fc0ca71171cda103ffe71052832b86c55981ff600df983b33d84a5e6852c9ef36c939c963080a7cee8ff707b209255af8

  • SSDEEP

    3072:gI9J4USyS7lNlpy+BKWL7z/gYiF/YqLwSLS4moQfB8iS3kAri:gI90y+flY+BKyQGoKmkA

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1100-138-0x0000000004C10000-0x0000000004C62000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections