General

  • Target

    1420-56-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    0a6e354337dac80123b02eeb95b4ad67

  • SHA1

    6d72bde508ac73813561fe16c2f8210f9a347f3b

  • SHA256

    6fd7556ab12637868b25bf9c3bb46e643afb6b00354da1cd7d307f9511c734c9

  • SHA512

    ae255a91eb38e3fb9addc0518a6fca2915b9912c8b83a72c0289ff9108cfce7a0e992b431dad743bd7c71f1c7cc0d54ed4b3d4e6d9df14fa558d0e35438ab220

  • SSDEEP

    1536:p4PVCEclFqlVZRGWKXoarKpe6KJtWGuKTGqVabud4wfVwDKyxARkuXK83wYk88ew:uI/lp4psMqVOv6VPyxARkuXKS8e8hp

Score
10/10

Malware Config

Extracted

Family

redline

C2

135.181.241.192:4328

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1420-56-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections