General

  • Target

    1960-149-0x00000000025E0000-0x0000000002624000-memory.dmp

  • Size

    272KB

  • MD5

    2423d1dfe5b81a5a18eaaffa9daecba0

  • SHA1

    4e9e4faea826f98b6aedaffceaf0640587ab28f3

  • SHA256

    c4c69c17726c41749fd528cf0632a5913cc9444da1a1ea3ceb13cabac5ba8fd2

  • SHA512

    e1dbe5253adcc05182639a7392aeada388c2dbab83657b1caa2623d4c3e3c863d6316b2244d2cc58c8894860ab333df17cb3359d18bd9785ae064b15696c10ad

  • SSDEEP

    3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1960-149-0x00000000025E0000-0x0000000002624000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections