General

  • Target

    1392-55-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    eebdc9cd2069fb5aa3b1cb38e8e724e5

  • SHA1

    da20efce01871b0ec1903cff134324b9ac868666

  • SHA256

    ab33234c0d2c10aebd06a2c92eeb3414db96a4f4d87a6d2abfacf41a9393955a

  • SHA512

    b7590d5b2d38a559f5ced21e9eecbf9a2817276af9a1c04cecbbb7e4fba0a0adb63166371a208ed01722de2f82ea2b5b779506ee3bb6b8f8a1f4efc53d3a0e5e

  • SSDEEP

    1536:p0HMjE/qhVZCGWZlwP/t8Wz6MiC6YdWjkTGqVOFWbuQ/xzuXheajC84wYkm8e8hH:TYJq8Wz6qdWjNqVOshoXheajCz8e8hH

Score
10/10

Malware Config

Extracted

Family

redline

C2

94.142.138.147:48665

Attributes
  • auth_value

    69d4f1af428790964f316100b6634867

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1392-55-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections