General

  • Target

    1684-133-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    1d7cf5f0328a00b42e087188a578c8af

  • SHA1

    6f30fecde02f9978d1c45c57a298a2feaba7b72a

  • SHA256

    173fab1b728068775693a4dc5bbb378c3d024714a528caf1a9d63499feca2b29

  • SHA512

    f88c4cb653c3760b6e3b2c409ff2c062c0fc9ccdcd3fddd7c62c7c2c885d07e3e24bb8a0c5703a1d9af18818b71426c51a9acbc2bacc22a9a726ad9ebe0f9e69

  • SSDEEP

    1536:FaIcnVHT16/oDjpEk+fPOg8//y/SFmDKnw967/hYjZ1bV7n/OFA+sYgibfbFDKsP:IIcZZdaXOgeyKmE1yFFGgYgafJl1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

vcxz

C2

185.244.181.112:39640

Attributes
  • auth_value

    c3f64556104479e612e28b2f8aaf39e5

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1684-133-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections