General

  • Target

    1284-56-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    5f5900dc18f0ff2d8662260e1212f9f9

  • SHA1

    672402e79f6c4105f0749f846aa960dcd0324a64

  • SHA256

    9b0d9abffc4662c54909e13cc6bb648b2100418bef6274ad9b422eb89af808ca

  • SHA512

    1330f32c3e934b795e879eaf39f6efbe84e7c8362fa31b88ab3eae53d46c729010f43c1e27c291cfd3b44ca4fae66c522efe05576227d1ad0e6ca4d6c0252ea0

  • SSDEEP

    1536:4bgCiFiqhVZCGW78ePUJE8W3LZKrPWTGqVMBWbuFUMNauNHrIkk84wYkk8e8h6:2FwGH8W3KrqVMgFMcuNHrIkkB8e8h6

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

3105

C2

176.123.9.142:14845

Attributes
  • auth_value

    b71a8d0b8d6c4fe6c412bd11f462d942

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1284-56-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections