General

  • Target

    1956-57-0x0000000001340000-0x000000000219C000-memory.dmp

  • Size

    14.4MB

  • MD5

    4d1170fc0164dba2a4b599984aaa577c

  • SHA1

    3fbce63706e3c17294411a751b683b734c2cf4eb

  • SHA256

    dcb4a5db6b0cf4459a1ce543feea4e90b5df60cf55df4a2513c967fdec37f50c

  • SHA512

    5fc303f940991e7b8535a277785e6f424a8dde24cdbb8812fa02ed988aebe9007464693e37eec02af86e947a0e8a84ebb041fec8165f47a1e944e1bacfd1bb44

  • SSDEEP

    196608:8yCFRy8/D8gz9PWY6pjCCoFeIkMIXUjwu6wysbxzwdGqw9m8jP6zd+uO0:+bYU9PbQMFe/UjpLy4xE+J6zE

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

2

C2

116.203.187.3:14916

Attributes
  • auth_value

    1c0b2a7d9265a0bd7186c9687fe62c4e

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

Files

  • 1956-57-0x0000000001340000-0x000000000219C000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections