General

  • Target

    1980-55-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    c541d4a8ed777865d02204f0efe0180f

  • SHA1

    8341a2c5499279dd3e3d45d2fb0daec78e77caa6

  • SHA256

    17d8b5a331283373a3abd2fa24ede14270b5958357096b5ba2b99c0f70737cc3

  • SHA512

    59f362765245c658c0c44c316c20723c3f77ce127e0d73ad4e0536b7ef10cc3c6e21483fb8163a982638ac7e34bc3af380c3e146d70edc28cdb5cf06fb6887e2

  • SSDEEP

    1536:aauNQzahPh0r8dXK2MDtydbLtuUI29+xn5MOZbV7cfaF96kMJrF:PuNzgryKztkPth+xbBqiGkArF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6276968093_99

C2

red.loonyt.top:28786

Attributes
  • auth_value

    200889806cf6e85d4015bfd17659e79a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1980-55-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows x86


    Headers

    Sections