General

  • Target

    1012-191-0x0000000000150000-0x0000000000180000-memory.dmp

  • Size

    192KB

  • MD5

    99f7e706ab73a287126c6e947564c340

  • SHA1

    5b3a3b42971f1362e368bcc18cc4ce3039d9ab7c

  • SHA256

    c9cba9e6efef6bd27e888444e0ae82d26918fcb6493ee60c46559b7b78dc5086

  • SHA512

    876276560283340b7e614cfab7f886bd2bcc0bf003467de9c998d384c07785c1991991c1a15a7fc60bf41a5a49cfb69b6d4f20b9ab7e3efd139b41f72bbb5fe1

  • SSDEEP

    3072:5+CgncfnivAgLNbcxNdydiyM4ROkmf8e8hx:5v5hsKmM4ROkmf

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1012-191-0x0000000000150000-0x0000000000180000-memory.dmp
    .exe windows x86


    Headers

    Sections