General

  • Target

    288-173-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    be35188118bf81af08b3c1102def5bee

  • SHA1

    20439894d807ddaec433d0569446055ea66faf15

  • SHA256

    73f9cdbd425089e50efc6687010618074757e676ade8cec8fe70f16e6222eab3

  • SHA512

    1c34000e196c5f8257b8d6f9f4a9c2069a0cf9ad8cf4d92230c2adb669719b53a93b522717c0f554d67b917ea76fe52e5d2b0634f67c0d408a4eb6680d9e3a00

  • SSDEEP

    3072:3V+m5c9QmRSRNhTYUwnuHyMhRZR8e8ht:3jAowMhRL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

wassa

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8fa7f0c657940c14afdbf6300afb292

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 288-173-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections