General

  • Target

    672-149-0x0000000004AC0000-0x0000000004B04000-memory.dmp

  • Size

    272KB

  • MD5

    0c2d8a25a9ded55b646bb0fafea78982

  • SHA1

    548399a85d9a457a437f8b8b306447ae36997cf0

  • SHA256

    f910f3fc81b84a2c2327f20928eb0ab7c4340982790707a555e753e3db84ae52

  • SHA512

    3f5fa45016ba42a7f6132e300f7bf82346303615a3a8a10968d10628a2359619a34a9bf632765355965c594fae71db4bd4d014e4d53c081795910c9fdd41fad3

  • SSDEEP

    3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 672-149-0x0000000004AC0000-0x0000000004B04000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections