General

  • Target

    268-128-0x00000000000B0000-0x00000000000DE000-memory.dmp

  • Size

    184KB

  • MD5

    a2c62e81c3be7e47196810f6c11ce168

  • SHA1

    2c4095452a5baebe0941a35d94c7f99e9bf49506

  • SHA256

    93a2a64ab5596797f97bdf590ac03528941e445fa71c75327bdb798d7c90c4da

  • SHA512

    f96d68c271fc55afca447f85834f65fdf96db2fcad25288c16b6bcc3214a5d348c8b085990ac6ec48fafdb54750ae35dcc8432ae68a031da19b4b3a054e2b0a7

  • SSDEEP

    1536:RaIRzICbajb+qhVZCGWDdmWPoQ8Wc94NiHjS4Z1oUg6TGqV4VWbuBNkqYvMd84ws:zsznuH8WcaN2jxsqV4cUK1vMd88e8hJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 268-128-0x00000000000B0000-0x00000000000DE000-memory.dmp
    .exe windows x86


    Headers

    Sections