General

  • Target

    1716-191-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    85863d3b86eb3ef8a95bb9645fb88b71

  • SHA1

    78fce016ad4023b01e66f24d654ebd9001884e5b

  • SHA256

    7d337281bd1c0392536f4c8f42d6a49af1ec1a503ed3b32877b87f5b627906a4

  • SHA512

    ecd81e29761810aafb42d5a58907acaa19e3d76412d421cc93e5aea979c8707fca6009fb8710f8a9cfe0c7e65de629a9598e9d9159bf7ffea4b0bfea7edfcb06

  • SSDEEP

    1536:vTbfqvqlVZRGWVZrlrBLK9ikvw5v8edLvTGqV8buIpPfEGV/Iey83wYkg8e8hg:7byslGi0r0iqV0vXEGV/Ieyy8e8hg

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

[ PRO ]

C2

185.161.248.16:26885

Attributes
  • auth_value

    b4958da54d1cdd9d9b28330afda1cc3c

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1716-191-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections