General

  • Target

    920-54-0x00000000002A0000-0x00000000002C6000-memory.dmp

  • Size

    152KB

  • MD5

    d0ff960046edf29bdb32d0a60e2ef6e3

  • SHA1

    6bf84f779e08fc403b0d4e555f582da1b3dd4cfc

  • SHA256

    c521be45de03b4c5633bf9c7ce57b4b9e34ba1756f102e298e2c154cdd4b6c77

  • SHA512

    d53b10824a61e1d649cb3235dd8873a62d57f4cf983322d3f2c227cd613293e7d1eabd340a47df1957459ec2bb65fc28b7ceffa97beddb9086addfafef5814d0

  • SSDEEP

    1536:YaxcnVHT1u/oP4Jq++fKSa+ZhXS3uBi3hZjf+bV7ZkORjQsYgibfbFDKsRv:dxcZZYKiSaUAu45KLJzYgafJlv

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM LOGS CLOUD

C2

176.123.9.85:16482

Attributes
  • auth_value

    117ba6a285dec3ca6df5c3821a5fd179

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 920-54-0x00000000002A0000-0x00000000002C6000-memory.dmp
    .exe windows x86


    Headers

    Sections