General

  • Target

    1476-62-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    b427485c58a3ed236e55a2f2610d6ba8

  • SHA1

    3bd81f6640218644cba42e847b3480577d507fff

  • SHA256

    d59fd2115010bad6509a312b5dd514664782c664dc17c1d25dac5661e461d4a9

  • SHA512

    afc16436c218d3c772fe32603d20d05a54ce72ce60bc431c374c71e6ffa39dd76709584d3bbdb9935c3dc71c5c4fc97db6292f2fbdd454250795e854ba4c1f82

  • SSDEEP

    1536:aQRBGlTP+mZP61SEYDmRSR+g4sOFVGLE7+0/9wVo0QRYbuNCtC9RmyC0wuei/QvZ:AV+m5c9QmRSR7x2ByOAyChhZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

TEX

C2

176.124.219.192:14487

Attributes
  • auth_value

    871ef4017f150ba2d537314d2610dc68

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1476-62-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections