General

  • Target

    1060-88-0x00000000045E0000-0x0000000004624000-memory.dmp

  • Size

    272KB

  • MD5

    665a7806597c8384b01e32a3d9a0f6bc

  • SHA1

    e62aa34628713df0c4fb6b9fa09d025740255dec

  • SHA256

    39b7a05ca123653a7d3bf06efac77ddd14feaa8df4ee055683ba666bc9554e12

  • SHA512

    578f133da2dd81110d03e8d2526a7356b0d34a3ae155cfb89fc563d83d9f64561723965b3c7e4d9a6f387726185f0bcd2e6cea22d7cfcad5896ae05bcfb94326

  • SSDEEP

    3072:E6j4ELN6FY9CqZuk6CeakgM+w/TDCegmo40ZThIIhbLnIviPJ13/HxNn2pU9f2Mv:E6jiOZX6CeOM+w//pSqIhvnIvW13

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1060-88-0x00000000045E0000-0x0000000004624000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections