General

  • Target

    1096-56-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    44dfed1d702f5ecfb5ea4c2c63be2a51

  • SHA1

    872a65bd7a207dc258c35dc8627307ab1f944141

  • SHA256

    e1d358246b17445950c55d89ed2440d04b264713b161017e26b21a8eed292234

  • SHA512

    8400fd9ffb77d4b79f98aa689d0c2104f35fcec66d44db950cc14ea7e9043d886d01311231556d85596249e2f339ba86e78ef5c29d589c322fe62e8466d72b93

  • SSDEEP

    1536:H+BGlTP+mZP61IEYDmRSNigssC3PnqwXjy9cdoXQxEbulbD8ChN0wuei/Cv+R+hT:lV+m5c7QmRSNMeKCg6y/hNhPZh8e8hQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@cloudcosmic

C2

157.254.164.98:28449

Attributes
  • auth_value

    2a96f95378fa2dbe8eb36b119e8fc025

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1096-56-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections