General

  • Target

    3748-206-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    f9a4b3582930e3b9a3bc66b333a63fe9

  • SHA1

    ce2d85abf4899793019de20002993c7f10044c1a

  • SHA256

    18357695be353d1ff1e61245e9545d59283a96e5ca52ad654ab7b83f65945ddc

  • SHA512

    95c24b74c6cf0a2f2f8a592f06f0b358034440ff244d07a975ad77daed419d6476e1db8e148074f1b6ee6ae8b59ef6c8eb7821d4a7466bd905d6c7d702d16448

  • SSDEEP

    3072:HV+m5clQmRSRT76SKyyw4x6rIUh+ZW8e8hK:HjoMUyyHUh+s

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3748-206-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections