General

  • Target

    524-62-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    dbb4db4eb5e373d82ceb42bd02ea8554

  • SHA1

    40bc7382024ef294741f41a30908935c0a22c955

  • SHA256

    aa2860a2e19891b09eee2cff69a3cf91ec47f4afb8512fe1e0f9e6af0811560f

  • SHA512

    a86e17394454c39fc33b41df446093f6c041fb58253f9b8ead1700a6855c9c7d9d33fa5c515a6ab37119ef9c24b62143350a41c7a5086ec8fcea281d54685c49

  • SSDEEP

    1536:NZBGlTP+mZP61QEYDmRS9BgMs3YfH9pJzCOyOvF+nl3z3hEFohQm0buAEVZh/w0f:IV+m5czQmRS9Hm72w3rhE6Gdix/whgZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1300

C2

45.15.166.130:44519

Attributes
  • auth_value

    2e328604bf1317edc3d8daa89e0a03ec

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 524-62-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections