General

  • Target

    3724-194-0x0000000000520000-0x000000000054E000-memory.dmp

  • Size

    184KB

  • MD5

    01df553bb4ad810c196f2f43321619ad

  • SHA1

    5b1ffdd1673040ebe390641fb8a70d4fbf445160

  • SHA256

    6f2c6baae8e736de32c2a6539762556a8860f1c5a17bbad3640863b7b7d5882f

  • SHA512

    02cf84b128a5fd24563f203091656a087eea0d1fab98b2ce46863f9dad1f961d894860c716b0cf51bb85018f5b3b52dc705bae6e722380f2dd03c437e34066a5

  • SSDEEP

    1536:pTXbeqhVZCGW+WEVPhq8Wg8fnv5RCNTGqVYFWbuME0aQ5ZDr/e84wYkK8e8hH:hLXWb8WgMv75qVYsKaZDr/ej8e8hH

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3724-194-0x0000000000520000-0x000000000054E000-memory.dmp
    .exe windows x86


    Headers

    Sections