General

  • Target

    1860-124-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    6e345429e4a1dd2cd69342f8dc87ac4b

  • SHA1

    4693d04e4963e84cf33e1f5ac172bdbade8b36cb

  • SHA256

    f933032458ae7db7621ac17bbea855ab3dca2b3355dc9aff5fc3c3fb5ea6b182

  • SHA512

    078d91e619c70687563df1174aef873caf4db9e11befa074fecd53def2302ba71fb0ad7193bf38fa3285308a290a9a8949a8ec22dc4ce4f20a7690b3b30ecb0c

  • SSDEEP

    3072:FV+m5c/QmRSNp2Tm1bENx3Gh6ZF8e8hU:Fj2w+nGh6P

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1860-124-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections