General

  • Target

    1920-149-0x00000000021D0000-0x0000000002214000-memory.dmp

  • Size

    272KB

  • MD5

    9ea5914e585cf724b39bcbf33fa4ac78

  • SHA1

    2a0f09d38759ccf3f0e11d4f35fe73612593718b

  • SHA256

    420f4f913e3d2d952bb8720d660795d857e95210a71efa43ba6a473eee635267

  • SHA512

    c556b49b4131ab0ed92475d0b0ede2e1d7c40200f2d015c2cbf85f6772c274661362a625370dddfd7db704d0a31d54cb46ec49d4b21b12886e7ecdefee7287fc

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1920-149-0x00000000021D0000-0x0000000002214000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections