General

  • Target

    1316-56-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    320866cfd793794a0a50d4b4f861091f

  • SHA1

    08e79760380382e81bd074b408affa6dab002081

  • SHA256

    c06eb82afb4a5e025dbd436b8e67afaa7c76e6cbdeec849d89aa5926b6ca0165

  • SHA512

    387b01e065738858fe208ebfbf03aa0b3702ced14a7a0935b3c9c32cc031456e526d9f82c35b5d135c7df30598406095046598b7da311a82b08522324d5c3105

  • SSDEEP

    1536:bYXuxvdFRqlVZRGW0fdr9VYzRqqllfFcxlTGqVibujZjEB97uQ83wYkT8e8hG:UXuxvDvn9qXfCxcqV22q977l8e8hG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mp4_29

C2

89.23.96.81:41397

Attributes
  • auth_value

    1ef43f46c5a6146d74ad90e2fcfacb05

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1316-56-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections