General

  • Target

    1156-62-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    d6826b1c317cde790f1dca6d03879c2a

  • SHA1

    015816e1a239ded239236a9f51b6957c15d4f12b

  • SHA256

    650c10bdad9c6a00f806b9a833772d7dccf12997f52e1251559fe95066a67561

  • SHA512

    a7451805d65b5ed0e4653f11e353a04e6f2a1f85d010ad820a174dc7722151cc8617fd87a25f98aa31a4127935b219425fd654857c36ba82100ea57ca82e2df8

  • SSDEEP

    1536:2qZBGlTP+mZP61QEYDmRS9BgMs3YfHc0gLF2Kx9NKoKQbtbu3wJjord50wuei/ZS:QV+m5czQmRS9dgpzNXLRtdo55hyZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1328

C2

45.15.166.130:47431

Attributes
  • auth_value

    1faa6e1e48c727af0de8585f85bee38c

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1156-62-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections