General

  • Target

    1600-110-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    cbee99693f7d320899e0486627021e50

  • SHA1

    a4121229bc78a370f977476d8b823e2665e2fe9a

  • SHA256

    e6ba3c954066dc05b32c47eb88b068f405a508afab453362b0708df0fa62fb29

  • SHA512

    073d82ddd7d7f7dd399e6395a3ea5da167e1cf85563c120ed271a77490a6fda7d02d2b46da8a0219c5db0670511416dbe07519f8a3ce191a18d98a6550a05aad

  • SSDEEP

    3072:XV+m5chQmRSZqThZlaiWM6hqhUZC8e8hA:XjEfb3QqhUo

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mesu

C2

83.97.73.122:19062

Attributes
  • auth_value

    8ede6a157d1d9509a21427d10e999ba2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-110-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections