General

  • Target

    496-196-0x00000000003A0000-0x00000000003CA000-memory.dmp

  • Size

    168KB

  • MD5

    3c565bb80781906423430395fa86b700

  • SHA1

    dcaa95a70b53068ac7bcb57e8e395e5dc34cba6a

  • SHA256

    2848464437559dcb08dec0eec4bfd58871ed5c8c5f65082269db4ee13d70254d

  • SHA512

    4f5127915000d870e1eb44c30f956e2d9f31921baf98e063a66bf0ef1bc0905eb07ebb6a049d0c680206990b233d23f0e52c14c4c68e6c73e28a00e2a5006632

  • SSDEEP

    3072:FV+m5c/QmRSNZN5oazQ6ipmzvlhyZj8e8hY:Fj2AzQ6nlhy5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 496-196-0x00000000003A0000-0x00000000003CA000-memory.dmp
    .exe windows x86


    Headers

    Sections