General

  • Target

    4412-204-0x0000000000210000-0x000000000023A000-memory.dmp

  • Size

    168KB

  • MD5

    94f9027736f73797891670be5ab973be

  • SHA1

    eac7798a5cba2d79c7c0367b45178f7308d31930

  • SHA256

    4d9298f5b9b3017bbe84e4f47a232522a364b9fd7c8295e71ff9b64fd759ada0

  • SHA512

    49f123ed6fd3e000f2f5dd82c221e3a8ac35382f31ab533b62796b48b20361cc249d3296b2dc628c43c62327512da81bcd5bd09f1a047ee987ac3b98870f0660

  • SSDEEP

    3072:qV+m5c/QmRSNp2Tm1bENx3Gh6Zi8e8hU:qj2w+nGh60

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4412-204-0x0000000000210000-0x000000000023A000-memory.dmp
    .exe windows x86


    Headers

    Sections