General

  • Target

    968-160-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    90c1c45cfb71ac9754df68e7d0af07ed

  • SHA1

    32b236993cfcb276010f2127049e4290fb1985af

  • SHA256

    e3755ce41a9605a2737b70fb57f80499fe64b51c89553a6d317e6553ca4c2a6a

  • SHA512

    8cf4252ece4f7bd4b885c29f628c8c598f7b523fce4b5e1f5053e6b700a51773e64faa24b51f103afe4f1154b2ff04f08c5f4a68c20cd4d15e7dc20a5dfc5867

  • SSDEEP

    3072:ZV+m5cpQmRSplDIkSTYtgoi8lQY4TvhAZp8e8hb:ZjMGDJ7goeThAT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

OLD

C2

45.9.74.131:33047

Attributes
  • auth_value

    b0e276ef63a52700e97b8c5e5f5673b5

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 968-160-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections