General

  • Target

    1584-55-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    208991444da54f51c3e8c8fe2a1cc4ee

  • SHA1

    ba5d8c915d056b12cf27139fd743409e78ec71b1

  • SHA256

    34ebade5347641f67ac1bed24b5a775430239c6367649dd2de8683499c639676

  • SHA512

    5114e85a967c07343d653e27bb085c4b7bcda75cba94048c0ddeda99beeec446a2feb3c2f9c1cc8753d17f64940ecafc5f844a109845cef2029db947c84dc5b5

  • SSDEEP

    3072:3YEauDpbWLEiXj0YAFwhzFjwWQLhCOfE:3YE9WAiXw2A3Lhb

Malware Config

Extracted

Family

redline

Botnet

@PatrickBat3men

C2

185.215.113.69:15544

Attributes
  • auth_value

    d863b06c2a0af571a3a24c11a2a15b07

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1584-55-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections