General

  • Target

    840-56-0x00000000000B0000-0x00000000000DA000-memory.dmp

  • Size

    168KB

  • MD5

    e3df9e011d36642981e42a69d73b37ee

  • SHA1

    b3f3752d5810ead5adaa94d61223f45fecd8fa05

  • SHA256

    724a8a034a6d1336c21d5e71fa570383d672b3f35d4bda0f56b9d77a00403dc0

  • SHA512

    120ae13021089ae29b52d3ddff0f1fbaa84993ee8663d66c70a20c7ce4e729ac23ed0b129c70d3ff8d107a589978e8c71d1ab2abc69c3dbaa345e0dc514c5af3

  • SSDEEP

    3072:QV+m5c5QmRSJLiruVyrKfhvh1ZP8e8h+:Qj8w0Mvh1Z

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@CLOUDCOSMIC

C2

157.254.164.98:28449

Attributes
  • auth_value

    c8ced34a15f6ccc97625aee05a0d1951

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 840-56-0x00000000000B0000-0x00000000000DA000-memory.dmp
    .exe windows x86


    Headers

    Sections