General

  • Target

    1764-174-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    2135c311645a7b6a87fe20115328050f

  • SHA1

    e5b4a955bc5284889bb79499846b8604360b1eb6

  • SHA256

    9a0b39a4eb47d15e46031e040734c18255860e746789eb3cad3ce1a7d0cc43c4

  • SHA512

    341cf0e2250d358d54938be4b2b3de6ff90dacf56d4fb0450e07c21d73ef2f8ba8264258a9cfc49bc495ac477f3d027af498ec2cb0f01f3f41248e34fa2f05f1

  • SSDEEP

    3072:OV+m5cVQmRSx0xlR5B2j5wMeoDChYZV8e8hh:Oj4plRExNChYf

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1764-174-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections