General

  • Target

    516-84-0x00000000049F0000-0x0000000004A34000-memory.dmp

  • Size

    272KB

  • MD5

    760f335db3b73b694b200bd753b636df

  • SHA1

    df5182aa4223966b7a87356fe53044c3639a4cb5

  • SHA256

    70819a1cb5c6423918e83678a215f29bd5e59cbf6447eaaddc206d32cec100b5

  • SHA512

    77b4405585aa76dfd17324ce1c3c2f6d5eb64c81debf3830b1807d66c737e81badf3429dc4a57ab09f54e30908360ed77f1bc70628e0e722b2052266ea9d99d3

  • SSDEEP

    3072:E6j4ELN6FY9CqZuk6CeakgM+w/TDCegmo40ZThIIhbLnIviPJ13/HxNn2pU9f2Mv:E6jiOZX6CeOM+w//pSqIhvnIvW13

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 516-84-0x00000000049F0000-0x0000000004A34000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections