General

  • Target

    2040-56-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    b7db08b64f5d13ac387c5579c6506513

  • SHA1

    5db3463a28d1fc9a8fc097e43142173b2e23eb17

  • SHA256

    6edeff81804e16afc174800f4bc60c578818579d8d5f2a71deb5eba15f3c48c5

  • SHA512

    6d7f5d9ee0979f57ddbb8ad9563e65fe4607195e9b96fb71a464414a91c8002ed0f445623c2785512af00b2f4e35609d8bcda8c63e5546d105b0620b730db70b

  • SSDEEP

    3072:FxU1n38g8Wm5ghg+L+qVSA3sgAZh48e8hY:Fx8n3Qa+5ciZh4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

3005

C2

176.123.9.142:14845

Attributes
  • auth_value

    213a2282a7fad0afc0f3a4475e58c7dd

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-56-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections