General

  • Target

    2028-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

  • Size

    248KB

  • MD5

    2e91c4191af9b0c186e7ae05d2b894cf

  • SHA1

    7943a77896180d9719488fe181f63a6374e75aaf

  • SHA256

    10105925fd49ce8e3fd546d79dc33090056d4ad674005b6e6766959343dc3bd3

  • SHA512

    6d9997a1872e00aa80f2c2fc33e211f09d0395a9f7d21cc2b852f24b293e403260fbcf1ebc1efaa2dfffb3e7de0a48cb7f24f0796628c3143fcc66af3c61a996

  • SSDEEP

    3072:Q6jIELf6FDTCjhnTzO6w/et1WuDCvgxo40TnCch36nycRt7fwxNn2pU9f2MKTV/C:Q6jocuVe3W8Y2chqnycP

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2028-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections