General

  • Target

    1252-56-0x0000000004A10000-0x0000000004A68000-memory.dmp

  • Size

    352KB

  • MD5

    96951b156d0a1459654d708251de79aa

  • SHA1

    a16b3c9a1ec2ef43fa05d846f0a2984ddaa6a0fb

  • SHA256

    97e21091fa35d2450430f192d3da25cf236defd92e1f03b63007980e87793db3

  • SHA512

    147d640e32f30af71ac3731e1ed9ce1395125f9fc663d6233c52a96f87582850d33213323dd48ea9c56bc8ca1609e391a5464af1fab67b43accd2be683a40c39

  • SSDEEP

    1536:/fi2rNGc0TjGmnSaPh+aH2p0IPNvxYKqffoCErXLgUbYvsrKoxBW79ojhP5N969K:bGc5ZmKy4Lh7uo7q9ojNHQfkArc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

GuruInst

C2

176.124.215.40:44406

Attributes
  • auth_value

    e4baf3ebcf790a17039085111018c9e0

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1252-56-0x0000000004A10000-0x0000000004A68000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections