General

  • Target

    1400-55-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    3bb9556338a644a2b424f917e029fb8d

  • SHA1

    68d4ead4626919bac05d059ce82460b1f2e3fbad

  • SHA256

    50141ea7e023632d35056608ab355db6e0478c7edd566ffff115f350b61953e0

  • SHA512

    29341856be29636e1d5df93d6e1db830671cf7a1096de3e2cfad3990a1a15ab24dc84010cd3d38151f7db48d957290bda0ba05c8b7d6978c9a27efa43b342326

  • SSDEEP

    1536:f1zeOqhVZCGW8+EPuA8Wq+dc/RfL8TGqV8tWbufHiwkWfBJb84wYkY8e8hs:f1CBb8Wq7V5qV80OCPWfBJbd8e8hs

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

0106

C2

176.123.9.142:14845

Attributes
  • auth_value

    b131e7346f6b2a05d3619937c6ae1a33

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1400-55-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections