General

  • Target

    1340-62-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    5c7ee13fd2d6f43b31d602b570cbce8e

  • SHA1

    844535ca0f25bc1ae39ac1045735910d3158a31f

  • SHA256

    c8311c2b0c4fca5377029f718598aab7b4c85f96af0c99a78d90a0452ab1f503

  • SHA512

    46ec5405aca7daf374cc499f52a7b7f47addb63c74b2157bca4730cd94a0afd8d4cd227879746a23c57887465665ccde92db05b80e22a79eb1c573ff5b69cbce

  • SSDEEP

    1536:khVstGWGEm86qlVZRGW80ArlRnoqiJEZeJmsxTGqV2buYBjLLwOggQbhS83wYkU1:khV+JsvpHrJqVCZXNggQbhSm8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

b1

C2

66.85.27.233:38093

Attributes
  • auth_value

    3a3297d946b1b89e7010873904425ad6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1340-62-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections