General

  • Target

    1792-215-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

  • Size

    248KB

  • MD5

    39925702e785a54588dc988f74b26ed7

  • SHA1

    6a7c9a370be6c8af123993f0e68373c7303876f4

  • SHA256

    83a376ce2f71c450928ebd8afbe9fd3802cc0ca197d233fc1a863583322f455e

  • SHA512

    c759e181fda2502de2ea8c588beddae1b0711b6feeab9f78d75caec43861bf116112cc7fcb3130a6aae03b50dd6f7c2ff55374a2aa1a0279a6f2cd24a3df94d1

  • SSDEEP

    3072:X6j4ELN6FY9CLJKymfAwUsmLo0XvqpvtvLn9Fo40n32jThSinnMZSonYBxNn2pUx:X6jixKymfAwILo0avtvLnc0Thznnto

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1792-215-0x0000000004AD0000-0x0000000004B0E000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections