General

  • Target

    2036-133-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    9e2fac67ceddc834113802675a439b21

  • SHA1

    d7c472882f022e816d28c025991efaf7595914ab

  • SHA256

    85d923661f3c936117005bf6abad6b366abe6aa1e8d49996da7ef9d0e67937e0

  • SHA512

    c6f062a2e8aad62302d8b657e8e18133df7a1cee8bfdd33a3632796cc925bff8ad7635add5ab67cd2e1c32ae104d1540bf9fde331fbd9228ac4dc1fd732c6d10

  • SSDEEP

    3072:uV+m5c/QmRSNp2Tm1bENx3Gh6ZF8e8hU:uj2w+nGh6P

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2036-133-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections