General

  • Target

    3660-146-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    bd31007248e069e1504f4124adec2853

  • SHA1

    09f67e4b21ec970d5d069ec3676e2dee4873384c

  • SHA256

    792b106014dbe6b3fa8273f685df9d27018e90cb51b803780a4db892af70c5a3

  • SHA512

    f70c2445ed3467d69b7d25840e36d8ee4ec622108953ec4c0aeb39a1e1fd8dc439fd893dc1c3d6e2b6083ccab6af9c7cff8aaf8c9e88922f899bd24217164849

  • SSDEEP

    3072:IV+m5czQmRS9Hm72w3rhE6Gdix/whgZV8e8hX:IjKF6w3VXTwhg/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1300

C2

45.15.166.130:44519

Attributes
  • auth_value

    2e328604bf1317edc3d8daa89e0a03ec

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3660-146-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections