General

  • Target

    1040-127-0x00000000000D0000-0x00000000000FE000-memory.dmp

  • Size

    184KB

  • MD5

    1d1bdca03cdc243f7308e5b96fed50b0

  • SHA1

    86a616f9097162815bf0e2e8bf1addb90eee69ec

  • SHA256

    1dcb3e9f9f771cc8c90f2dbaf45746e1ef16d653c6f8ef2c58672c8caea77c6d

  • SHA512

    655095294a8511defab969a170f43be565cd1b3bc8335b958849bc8e9fd9e92d7d8c625dafa3668ee9f8de444589dfce609c4c8f0841b9f71619f8cbd233261e

  • SSDEEP

    1536:/aIRzICbajb+qhVZCGWDdmWPoQ8Wc94NiHjS4Z1oUg6TGqV4VWbuBNkqYvMd84wC:9sznuH8WcaN2jxsqV4cUK1vMdu8e8hJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1040-127-0x00000000000D0000-0x00000000000FE000-memory.dmp
    .exe windows x86


    Headers

    Sections