General

  • Target

    2844-152-0x00000000072E0000-0x0000000007332000-memory.dmp

  • Size

    328KB

  • MD5

    2a6387ca98d4b292dd98b72fd3ec1ff9

  • SHA1

    60af539956beef9b2df07034421c8b90145c1431

  • SHA256

    cf64d93c9ba04d4706202e4bc5824e5f7fedd07b0c0cbaa1e7f356f9c446aa0e

  • SHA512

    4112e6da3867aadcda40fcfaf9fca527551c1b102ddb732cb5919a03a4a1128eb72bafe7882d7ce35441d347781534fde486f51c49b2a91157ff4fc88bc091de

  • SSDEEP

    3072:/IGx+uWC+TNRbqbETELUQLhHHSLCeFkAr2:z+Q+ZFqbXLUx5FkA

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

koreamon

C2

koreamonitoring.com:80

Attributes
  • auth_value

    1a0e1a9f491ef3df873a03577dfa10aa

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2844-152-0x00000000072E0000-0x0000000007332000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections