General

  • Target

    984-67-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    c946973dba096c81ba3dc9216e075d2a

  • SHA1

    266605c19ff93b7671247df36e11e47eb7c16c81

  • SHA256

    abcdec8e0a124c3209fa2d8f64ffe387d6eebbd5a2fd777c494e20ff7c63fd27

  • SHA512

    85ed834d20add3ee0a2d0f20ab3d9e2ce3a6d34e0e15b8cf1f42e1d03de8c95be4f715167514b2352c60d7543ce1ce23fcc66b9fdc8b312f9a3b74568b4732d5

  • SSDEEP

    1536:N2BGlTP+mZP61SEYDmRSR+g4sOFVPYSs1E5TuEcFcoUQJDbuRodlx9tx0wuei/FR:rV+m5c9QmRSRd71kaBfhJ9dhtxh+Z

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

build1

C2

101.99.93.194:28049

Attributes
  • auth_value

    d9b4859f9090a89a831ab84ed61a9faf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 984-67-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections