General

  • Target

    584-128-0x0000000000090000-0x00000000000BE000-memory.dmp

  • Size

    184KB

  • MD5

    d109a16430938a2c4cd4ee94c91ca765

  • SHA1

    3a4bf0051f2863db6e0f4eb34c1aa2d7e7f1423c

  • SHA256

    cfa0ba641ee30fbd5bb744a6330ef819db87011be0984aaeddf3595b6b70b60a

  • SHA512

    b00efd08917a7dd3b1f162dc25dbabbc7da1ec03bfda811681940b9b9f9667a510cabb40007bd2e6a9dd5d9b4b669b706eab5439ee3fe10267caa0baa05a4609

  • SSDEEP

    1536:jaIRzICbajb+qhVZCGWDdmWPoQ8Wc94NiHjS4Z1oUg6TGqV4VWbuBNkqYvMd84wm:RsznuH8WcaN2jxsqV4cUK1vMdq8e8hJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 584-128-0x0000000000090000-0x00000000000BE000-memory.dmp
    .exe windows x86


    Headers

    Sections