General

  • Target

    524-65-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    b2e99a205f3858e8a8e3e72f3d1c1490

  • SHA1

    b4f23d46c8edea7b9ad46c5fd2670f2f411f3979

  • SHA256

    37b3f76c07dabf1bd2165b7a2a6a48abe5705b273f36db379c126da1fc0ab01a

  • SHA512

    1172a8d48ccea13a9a6c9ba5c5f92171d0746f858a87bcff16e3eaa8c149bb6a8de02861b421f7515211a26ac39637bc2167bc45dcb68a317b749f407a419d16

  • SSDEEP

    1536:R9v8SnHqlVZRGWVmZrCBVERvPjMtjTGqVQbuUwPtvHcU383wYk:b8i0fCBQuqVgiPZHcU3

Score
10/10

Malware Config

Extracted

Family

redline

C2

198.23.200.118:30696

Attributes
  • auth_value

    48274c80f2594acfbb94441ae0725280

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 524-65-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections