General

  • Target

    592-132-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    25fb9b71fca792b8a5b032c3913a8899

  • SHA1

    bc9b00b800cf7a5195b89e70e3d1b2dc37c7b417

  • SHA256

    b548d9fc1b0b460554778acd8754e2b6837d451347a30d75773a249a3c5060ae

  • SHA512

    33bcc3d685e4e8943e0aa597852fd5cbbf44a0aeaa1bcc1dedf75f790e3ae9e6c3d0ffa59b24452b7c0fb36da01a22c77bbc3ae09f759d5103fe9faf935df583

  • SSDEEP

    1536:D1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6VqD:D3KDlRy38i00xNKe/Jq7BoclI8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 592-132-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections