General

  • Target

    1844-127-0x0000000000090000-0x00000000000BE000-memory.dmp

  • Size

    184KB

  • MD5

    8efff2ad93ec71df23ac0722128f67f2

  • SHA1

    a4163effdccd796a8643b7253116251a518d1bf5

  • SHA256

    d54c8764e4cbf1b08f52dfb30a2ad3594630faa4295f2af217f1bfce073e44a6

  • SHA512

    aaa624fc9c83da5691207700757843176e6ade63b6e839157b7414a8216a01ea3c25c6dc0d6e9ea11bde8b5d85862b837f2abeef035b0af98073292208540f44

  • SSDEEP

    1536:9aIRzICbajb+qhVZCGWDdmWPoQ8Wc94NiHjS4Z1oUg6TGqV4VWbuBNkqYvMd84wm:fsznuH8WcaN2jxsqV4cUK1vMdq8e8hJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1844-127-0x0000000000090000-0x00000000000BE000-memory.dmp
    .exe windows x86


    Headers

    Sections