General

  • Target

    4780-133-0x0000000000630000-0x0000000000660000-memory.dmp

  • Size

    192KB

  • MD5

    d8a0fe4ce6cee6248e51ec217e4acbfa

  • SHA1

    568389e828e60dd5aa25ecee7170f5f2b0c699c8

  • SHA256

    afd6562b8c27ee8374a9927729323fe28ddc0ea1b1ac46fef4a08a8f89e23b3c

  • SHA512

    97bb8b72fa5cb9fc10e2df48446edf66c96d17a33c17a827f63bb24f28b3be0aa21f5f5333594cffb54b143c0b4195d58733e594e0894d94dfd901b03abad997

  • SSDEEP

    1536:J1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6Vqi:J3KDlRy38i00xNKe/Jq7BoclJ8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4780-133-0x0000000000630000-0x0000000000660000-memory.dmp
    .exe windows x86


    Headers

    Sections