General

  • Target

    4444-285-0x0000000000F80000-0x0000000000FAE000-memory.dmp

  • Size

    184KB

  • MD5

    8199aee414a007601dc9353b54fdbf64

  • SHA1

    0e246057b85906e9bfe9293c4bc07af1b999b99f

  • SHA256

    9f5deb52605e28328ac568529aa39d3c550e25e927e400c06a032c96601327a0

  • SHA512

    2b9717d6d98005ab86716a64e256704434883317b9506d7619784a0d4ba5e4a93fb6f67069ac33595293f7eccc2133a0296152038e194ba0763046304cfdf328

  • SSDEEP

    3072:rC3YAOj8Wc2CC8cO7qV2k2obrgOdZ8e8hr:8YAh2CLdVOrgOdZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mauga

C2

217.196.96.102:4132

Attributes
  • auth_value

    36f5411cf117f54076fbbb9ea0631fee

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4444-285-0x0000000000F80000-0x0000000000FAE000-memory.dmp
    .exe windows x86


    Headers

    Sections