General

  • Target

    1944-149-0x0000000004A10000-0x0000000004A54000-memory.dmp

  • Size

    272KB

  • MD5

    946cace26b307360e3d36b7f8e18c178

  • SHA1

    6671954224bcbeedb62fee01f75ad6ceb14b1674

  • SHA256

    18df01c3dea52c46cdd78d61445d082ca9b4f07103040e65cac1d3c1df25edf2

  • SHA512

    7bfc2f86a19e0893915ac23651bc2f998672acaf0c080295a72e3d7aefcc00b2220c228974dcac3b9d5d80d2f1610187d88c406d0797daa3b00703eda958a498

  • SSDEEP

    3072:E6j4ELN6FY9CqZuk6CeakgM+w/TDCegmo40ZThIIhbLnIviPJ13/HxNn2pU9f2MW:E6jiOZX6CeOM+w//pSqIhvnIvW13Al

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1944-149-0x0000000004A10000-0x0000000004A54000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections