General

  • Target

    1916-132-0x0000000000090000-0x00000000000BA000-memory.dmp

  • Size

    168KB

  • MD5

    ceddfcb7c85f3f1609bd7d006b89e2b9

  • SHA1

    8c00b2f455e874252b68230dd21b59d93ec239f7

  • SHA256

    e0ec3dc4fc4ef5de852744d5ab63215e3d8ddaec968d34ede034def2db8d67cf

  • SHA512

    80ed14ae86c4d661b70cb4c7f88a1d65c45f25b6b66cba513fb874599f28094fe8bf1224c4eddf64d0b4cfcbe57a3a1214dfa4e128523bd06851883cb05e3884

  • SSDEEP

    3072:WV+m5chQmRSZqThZlaiWM6hqhUZd8e8hA:WjEfb3QqhUL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mesu

C2

83.97.73.122:19062

Attributes
  • auth_value

    8ede6a157d1d9509a21427d10e999ba2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1916-132-0x0000000000090000-0x00000000000BA000-memory.dmp
    .exe windows x86


    Headers

    Sections