General

  • Target

    556-172-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    e5f29a6faa7c8719191f5e4fad750d7d

  • SHA1

    c1b111a129119a9d4e0565224f86f605ba4614da

  • SHA256

    52d149b58248286f57952ebcf2495a72cb40401109dcc58643371e598f5214fb

  • SHA512

    378b833f8651f64f8aca51da5c677cba53080f9579c2ebf9d549000747cb71d9a5e57efa3d571c39106467826cefd0ea14d98190fd0477d684a7eb8810f8416a

  • SSDEEP

    3072:YV+m5cbQmRSNwJwMnsojq0AhrZY8e8he:YjSx40AhrS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

srala

C2

185.161.248.75:4132

Attributes
  • auth_value

    c90de493c232a904fb467fa366785cb6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 556-172-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections