General

  • Target

    1488-196-0x0000000000410000-0x000000000043A000-memory.dmp

  • Size

    168KB

  • MD5

    4dd9979235a2e65a8aadc28b35ad5e65

  • SHA1

    df81019d9d10f087c45307a867282d6eab5f7fef

  • SHA256

    7ffff9ca2afbd088efeb204537b50aae9a46420f6805d954a0ece0e8a503d206

  • SHA512

    21e810a5a6752b1aa8e876bda02ec4cc0066a439182a494fdc583f4c1f2db0e2b200c36957597d19436f0616c5d7cdab588b2fa9afbf56fbc13605183217b4eb

  • SSDEEP

    3072:uV+m5c/QmRSNZN5oazQ6ipmzvlhyZG8e8hY:uj2AzQ6nlhy4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1488-196-0x0000000000410000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections