General

  • Target

    756-203-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    f3223bbf5129de4600ae2648da0b9d8b

  • SHA1

    19bba42484e446f97bbf0401b909a66fcc0f0941

  • SHA256

    f2990b33c8a67b525d84502398f67f556aa49583abaabe386389a7a475faaf23

  • SHA512

    b4da2f3b4631676dd73bf531eba9b12f6b047d8acb3515267b12851730e05a8a02255105aaa7173ffcd80c3377279c1a6e3d2a9f4c359505d74015aed7afd32c

  • SSDEEP

    3072:FV+m5cVQmRSxHBIvBIDNmggk29/rh2Z18e8hI:Fj4lBIDoJhrh2f

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 756-203-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections