General

  • Target

    1620-144-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    40cb3a9567f9e4075478ed5221c3a1d0

  • SHA1

    3c1841c8b08479f57106a33d1e2160b5f12247fa

  • SHA256

    3f5edbd8351dc0d3d916636e42196863244cee681940b2004b4496c3f233568c

  • SHA512

    2ac23f430dc5632207f6434c7569dc26f406bbc0af1357e81b62a31d854d35da5a89b7babba2e3942f0e4f4ca229b5a2fe3d2dca1eb86415f62266660d812b00

  • SSDEEP

    3072:0V+m5cNQmRSxkjU3SDYwihyCNhiZx8e8hZ:0jwhDgpNhib

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1620-144-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections