General

  • Target

    2004-56-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    224f3f3cccc0aad8f8539e9332570d18

  • SHA1

    92ca9f905a6b691a8a49801b8fde66d4d6bd1056

  • SHA256

    3eb80b9f93151e55802b5654064a8ab45c50403e8bd4d8c8bf57e60bd423546c

  • SHA512

    d2021ef117310b71139a5056e2802ea15f75168ef70c4a419e92eac5c7886c8fa31582eed0e9a5feb3eea2185ad3388f935d725f4fe1ace703d54f88f5868044

  • SSDEEP

    1536:xaCGcnVHT1u/o3Q5O6+f7NWyU8FFD/WD/38VFhmLjf0bV7O/OCsasYgibfbFDKsM:8NcZZgKjNWw7OjA/mnMkGBYgafJlS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM LOGS

C2

176.123.9.85:16482

Attributes
  • auth_value

    3b8e6d0c567dbb718c4e263b091b101f

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-56-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections