General

  • Target

    1576-126-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    6fd31d82083466a04b6bac6ebab47c0d

  • SHA1

    cf66fbe4768119869895fdf81881e9f2f2500b13

  • SHA256

    cdfcdd4142739098430835dd494482487f0ca71fa6bda2a8851a933a1897865a

  • SHA512

    536ea83d3626ae2e7185ecd23b5d5d5f3fec01795112b5d6f9c7a398ac11e821aa6615ba45597dca235dee7030fb7a362959846775b186e41aeef76372136eaf

  • SSDEEP

    3072:HV+m5c/QmRSNZN5oazQ6ipmzvlhyZ58e8hY:Hj2AzQ6nlhyj

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1576-126-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections