General

  • Target

    764-150-0x0000000004900000-0x0000000004944000-memory.dmp

  • Size

    272KB

  • MD5

    1d20bc9dd2debe5c49109d2bcf4ca2c6

  • SHA1

    8702a29617d3da0f0c2bd9594c0f0930d21a128e

  • SHA256

    d04417e40817e90288438963690ea377a2ead28e027727d3d08aa4b341ee1d77

  • SHA512

    6624d1d0d8b94ba5074d72507e5244de401be1e87436e688c50874f3ab127b680f1ec9762d76c2f9bf15b536a5d67d0b3ed53c9137f4230c48049b0539a494f6

  • SSDEEP

    3072:E6j4ELN6FY9CqZuk6CeakgM+w/TDCegmo40ZThIIhbLnIviPJ13/HxNn2pU9f2MZ:E6jiOZX6CeOM+w//pSqIhvnIvW13p

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 764-150-0x0000000004900000-0x0000000004944000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections