General

  • Target

    3212-158-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    987d8d918d992d570a0127eea2d43b4e

  • SHA1

    88ee0e58f01111dff60203ee413cd8a3f074055e

  • SHA256

    25764d45452a5d3c465008a660fd0d68b0135b44ebd6436723f8e8be9a636b53

  • SHA512

    b6433961febfab963a90de62774876c7a3ae9c7a803c3dd0440d6e9d1704d66bcaf33a57c95e49efbf818906d85465e149b592040488847c81ac4289d2b8aba3

  • SSDEEP

    1536:lOI2AuD/qlVZRGWnxB+r2tya6Dnsf699ENTGqVKbuyyo/jkYo83wYkt8e8h3:N2p+1U5qV+t/AYo/8e8h3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Newport

C2

82.115.223.91:82

Attributes
  • auth_value

    a09b5f524a4953a98e4cd6a51b761e77

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3212-158-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections