General

  • Target

    904-135-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    f3a6d611a1c64ad08c8c5c0f8dd41a1c

  • SHA1

    dc54412e75ef5b8f021f5084f0dfc94c8293102d

  • SHA256

    3bebc9744adb2399a91804225fda34adf70fdb3b477ca6cf34bc9b96f32a3d49

  • SHA512

    92bcfdc9c44923c9abd5b299c4590b351abd6bbc6533d8998bf71c6c99eba82803331bf4a7e8ee53e5d1fb527d594a92582a68a641624510d80797c52788c6e5

  • SSDEEP

    3072:DV+m5c9QmRSR2IB0x6JjwPvThqZB8e8hz:DjAmyxnThqr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

manka

C2

185.161.248.75:4132

Attributes
  • auth_value

    d94715c55e1c02ef0aa67081d47a0c1f

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 904-135-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections