General

  • Target

    1064-127-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    0ace9bd201a23fed1c786d5ab4a4be0b

  • SHA1

    285a856aaf743ed1f0b98c4af81fe93f17d14085

  • SHA256

    d34d451d31b913ce90e294c04c4451f69b9cc71ede4c5108a1e36debbd4c72f4

  • SHA512

    d40f76e7356c422d49257d7a58a71a3b59a7875dc33c6c7de7503c544f6b830939d1234934a53632c4db47d273c633287cdc0baf75df1f8b624b213b7a8e5107

  • SSDEEP

    3072:qV+m5c/QmRSNp2Tm1bENx3Gh6ZF8e8hU:qj2w+nGh6P

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1064-127-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections