General

  • Target

    4188-214-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

  • Size

    252KB

  • MD5

    da9b072109d890374c3bab5e9a695c81

  • SHA1

    67b02a23f603b4d3b97170ffa595ed47600bca5c

  • SHA256

    88008acfc6a49ac7b8d3092c2351e76f9e9435fe27f247ed1c1924dd36e8cb72

  • SHA512

    6a68e6f1aea518de64e322b225489dddc09af140ed6a35f47e24115c09d121da16645e45441856cbedf4dd9a13b3cf19ad6aec83f2858ed595b002c7663822a9

  • SSDEEP

    3072:P6j4ELN6FY9CqZuk6CeakgM+w/TDCegmo40ZThIIhbLnIviPJ13/HxNn2pU9f2Mv:P6jiOZX6CeOM+w//pSqIhvnIvW13

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4188-214-0x0000000004DE0000-0x0000000004E1F000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections