General

  • Target

    840-133-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    46a4e89e52e73d5066a469475f853616

  • SHA1

    aeae1dbde3a0d37bb5ac0f91863c51d1ca58fe5f

  • SHA256

    95496a6a2beb7621c8242267402f9c4a5374863a8f6033f74745d3717ce03dc4

  • SHA512

    b261c344895644d63bcfdd083e8344b74d710983357348094cd9c1a673e77ca3c80ccaa17f3fd8c6f947cde21efdd064bef0aa6cf56e6d22ace5726fb87f68c1

  • SSDEEP

    1536:OTXbeqhVZCGW+WEVPhq8Wg8fnv5RCNTGqVYFWbuME0aQ5ZDr/e84wYks8e8hH:qLXWb8WgMv75qVYsKaZDr/eZ8e8hH

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 840-133-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections