General

  • Target

    1660-176-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    5bbd758d49bcd07e65cb776fe0788d8b

  • SHA1

    2360fd3738caeefb98d7a34fc9d9714e52542b2b

  • SHA256

    cee16d6708581808c235d93fbe2277ab9ec94ac73f7faeb1e064388a565016dd

  • SHA512

    d2f822157670e7392c56f5874e2ed63e3b7030d3eeeb9251ad8a0893db2348e964c5e722a5b191ef41fe329348add9faa640a1a45f158d33af79afc917ca6123

  • SSDEEP

    3072:SV+m5czQmRS9KeyNefOax1GKhwZt8e8hQ:SjKZQf4KhwH

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1660-176-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections