General

  • Target

    308-134-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    e263a0a108ef9fb8f74031b2cfcaf0cc

  • SHA1

    83e2d6c782b33997378a2eeaa1605e3ac8d62162

  • SHA256

    8bf9c0b4d91336773d010e670d59c742ebbed4fe2b2a657aff4d5ab7452b69a7

  • SHA512

    53884269033e103f3e1aacb730f5bcb7384eee3b4cbb48ff8349f4ada645f6ee43ca653edc3c92c36d0eeb8c34be7ffe0bf22ef5b4c45d2b17d756e1fa9a6c16

  • SSDEEP

    3072:PV+m5c/QmRSNZN5oazQ6ipmzvlhyZ58e8hY:Pj2AzQ6nlhyj

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 308-134-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections