General

  • Target

    1608-127-0x00000000000D0000-0x00000000000FA000-memory.dmp

  • Size

    168KB

  • MD5

    c4384a242d44219158c56a49c167bcb3

  • SHA1

    828d015b3bf1f61232dd12695adc40df87520954

  • SHA256

    f175e1d827b4b42a4fcac54bb2af95a2fa16ce4c7b9bc9344a3ad6ce5961fcdd

  • SHA512

    f0cf778cb793646e0c6f600fa70c0ebb124669c4c27d1c44d5afd952743c434c8c171dc5de650a41b268571a3d0b0ddf00e1b6e7c421016e86d0f2d6de10049c

  • SSDEEP

    3072:WV+m5c/QmRSNp2Tm1bENx3Gh6Z28e8hU:Wj2w+nGh6Y

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1608-127-0x00000000000D0000-0x00000000000FA000-memory.dmp
    .exe windows x86


    Headers

    Sections