General

  • Target

    1468-55-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    2b30873f606d7e2a78cc3eb6e9ec0699

  • SHA1

    429a40030d47580d28cb31816cbd774e1ac21e59

  • SHA256

    b6bd80c7b9e0ab9f67a9789b0846608aa3dd5c135c8ae3d4d78e0cff5a260fcb

  • SHA512

    d746c589ee38a4f1d485d4acd475b8ece4cd885caff0b99aededc72f51ad58646231f9dc2262460e621b1e82a48bbd9e43fad14a99e80f997b1158563fb6b2e1

  • SSDEEP

    1536:qGrKqlVZRGW1TUrP1hZi44X2Cm3rm7xTGqVgbuQ+pW8yTuR+T83wYkm8e8hr:q81cXcGC/7AqVw0pWvTuR+Tk8e8hr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

dreff

C2

65.109.9.207:45580

Attributes
  • auth_value

    94c3ef096ae54bf2978228b64b277be2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1468-55-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections