General

  • Target

    976-243-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    8d92b208b53e4bbe56c21217981233ba

  • SHA1

    2e89d5b90265fa7ff77578acb1cf5bf37d5a6180

  • SHA256

    c74aa648db150c7779fbf2dfe8a5d1fc565a7faf1d89bced7ecf0814c9bba989

  • SHA512

    475026b2d91db06035d6d04f1667c5429cb7cacb5ee39965eea5beefb346e49ab80003b3a00a74324a8f8dde49a0af6d09bd98fa24f1381f4d7dc3c0e28cd587

  • SSDEEP

    3072:kV+m5c9QmRSRomMYCMeUWNgBhhZa8e8hR:kjAdB0BhhQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rumba

C2

185.161.248.75:4132

Attributes
  • auth_value

    35dbb4006087a5d5c211b21be41adb90

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 976-243-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections