General

  • Target

    804-90-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    a68db803123705f90026bd0351ab31cb

  • SHA1

    09abac9192ae0adcda2497dd1753aeaf91ac1c34

  • SHA256

    d8b09b725ae9c4776b5c0481f1dc9a9694964ca89747456987d96e18c740e1dc

  • SHA512

    be75739f8f0bca8b75cf3f29e53ad221d3ffc883e6059556fdfce61490db38dc75848a879b0b98b37dd5a839e37b40d5ca0bad1dcd3b87094322ef5a9fd891d7

  • SSDEEP

    3072:F37XewnZ9aEejfYqVwedclucXB/eKp8e8ho:F37uSZ9anwOiIcXB/eKp

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

newRED

C2

79.137.202.0:81

Attributes
  • auth_value

    9ad854cf84197500790da786e3607067

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 804-90-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections