General

  • Target

    2004-55-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    24aa78d39bd94a7822883c8dd3ea75ed

  • SHA1

    2d8dae9f3542f804841d02c1ab75fcbe0452d4dc

  • SHA256

    f7adf36576ff16fd8fed03e464756d5d36cf78c1795326159b46739943038499

  • SHA512

    034dc0adf2e7b2480d5b9e970c2f617b124a8fe26022870a81549365768eb6b681b83ae5ff2a0b6ec226e1e129ec83f7f67eded6ef367a52db6d068427719cae

  • SSDEEP

    1536:1hBGlTP+mZP61QEYDmRS9BgMs3YfHeSPwbi154Ky6o7QsAbupoLMxgzY0wuei/PO:IV+m5czQmRS9BPtwMPvXzYhMZ18e8hx

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@dxrkl0rd

C2

45.15.156.170:43588

Attributes
  • auth_value

    9c8dd7353be7ed4b6832da21d8d0d902

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-55-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections