General

  • Target

    1592-56-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    8b76e32ce82f2c3a6315aca75da25323

  • SHA1

    9c72914169806f0a2010b6d36e4c5c6abca85c9f

  • SHA256

    5ea5dbef8c46a3edbcc924e3b4f5f78234eb5cf6d04bbd4e63ea0dfa7dff57a3

  • SHA512

    3dc7c8d67e2c468028562584cf4783bc298a97c63dfc5ea1602f6cb57a2e928279d9978fa8871f72f682d3b53649fe396d9df59e8227fd53bc28daf39e59db9d

  • SSDEEP

    1536:h2UGoZqhVZCGWqBnCPHH8WVugJ8GJK907xTGqVshWbuIqn7zlY84wYko8e8hx:hRxsW8WVu3uudqVsA+XlYN8e8hx

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

a1ex

C2

176.123.9.142:14845

Attributes
  • auth_value

    d37f5dc2bb3e963c3d40ad7fc1c4c328

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-56-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections