General

  • Target

    1444-56-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    44d1d34f2743cab5a08aa8707daf4b8f

  • SHA1

    ca2cb3c7526b3bf13e5c8c3c4a535876b86c6bb2

  • SHA256

    5ff9463100c7d2670ba09202dbc31d1478930eed54f97e03b2d412cc88146d14

  • SHA512

    3b6602bcffdaaef1fbd688c632d2b0361d7cdea27ef19d4eb9402a2be08ea1bb0db8db55cc1100d55f109adc8743aeeb1e3070093c72406d1fcd18249df0e39b

  • SSDEEP

    1536:eaCGcnVHT1u/o3Q5O6+f7NWy9Fu/OYmtZhZja9bV7e/8H72asYgibfbFDKsRq:rNcZZgKjNWgurm90NU0HIYgafJlq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM LOGS

C2

176.123.9.85:16482

Attributes
  • auth_value

    63cc484234216dace4114bc03617721b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1444-56-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections