General

  • Target

    1748-56-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b243e85815834e89bb1619ec99e2d852

  • SHA1

    fbaa3b8e38f5a811381b44a4bf065984c649fb9d

  • SHA256

    bdf6a01f84707535ba9c91721fb0fb9a2202f529aa13bcf5d81a696164ed6f33

  • SHA512

    a82db9ac017a3e23e424ac91a08087242aedc7edb1a384cc7311c2ec55897aaa9610618e8046967ae5084f6c29c5874b48bbd56753efbe19104d87e26050f5f2

  • SSDEEP

    3072:LPQgtmtOLbY7gce2Cb2B1L89VQuuxNNqGpHNxF38D8e8hQ:LPDmt5LAQhxF38D

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

buddha

C2

157.254.164.98:28449

Attributes
  • auth_value

    e1e60eda1d6a017c87d16360c6288876

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1748-56-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections