General

  • Target

    4708-196-0x00000000003D0000-0x00000000003FA000-memory.dmp

  • Size

    168KB

  • MD5

    f38deffe52211ea62b9665978126d3d1

  • SHA1

    c7432c91111aee30baf60f9564e53889d77a1f2a

  • SHA256

    b5f692f2389c1ffdc55230dbf4d41ae581bb5b35e558dd03611754206cc193ae

  • SHA512

    cd41b8ccc1a0e7661d0b1db513945e0f1e8f5dbe6e8510f1b374364e13d3a321d5798accbd969b98ac4e2dee10e33c4ca7ff4f8de171f21e9d0215a24a43e329

  • SSDEEP

    3072:mV+m5c/QmRSNp2Tm1bENx3Gh6ZG8e8hU:mj2w+nGh6o

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4708-196-0x00000000003D0000-0x00000000003FA000-memory.dmp
    .exe windows x86


    Headers

    Sections