General

  • Target

    2036-142-0x0000000000340000-0x0000000000370000-memory.dmp

  • Size

    192KB

  • MD5

    0187899b444b04af3f5e2dcae9915ae6

  • SHA1

    663ab73d966bf3b315833e8ddeda59c148fc0c69

  • SHA256

    09300de11fe9bceefa51d3e3d72e79a58e18759ecdb9b8d04fd9570dc73ffd9f

  • SHA512

    de21c4f5cea52331f08e779b279ff165a41f9f2e7680fbeedad92baf88fc79d60e8044d162b381a119fc958d0ed6b052c4622d7170a065f3aad5d537ff70bb31

  • SSDEEP

    1536:o11dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6VQ:o13KDlRy38i00xNKe/Jq7BoclE8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2036-142-0x0000000000340000-0x0000000000370000-memory.dmp
    .exe windows x86


    Headers

    Sections