General

  • Target

    1308-174-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    5d34181c99989d9433edb7364bd07dc9

  • SHA1

    d9956c6a7df7cc535cc488f0252632d3432f4202

  • SHA256

    387c7861920e8e8ae4e0e8ce6a893fdfcd7a81cedfd55d150f7f3213e0288317

  • SHA512

    332f77ac5992d2af61bca2e01ea87ce09c795276a8c1a8d598a9d97acfc76bb861a95b82c59560e18a51d3fef83c41e03ed1f7c27eaffd6e9aa08e87990ee1de

  • SSDEEP

    3072:kV+m5cVQmRSx9Xg53e/po0/BmghebZ58e8hi:kj4eCghebz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gorka

C2

185.161.248.75:4132

Attributes
  • auth_value

    4e146017307b833f6db8bdd5b092346d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1308-174-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections