General

  • Target

    620-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d7024aed4b1c362e186727439c360415

  • SHA1

    3ce014bfe07147d320a7e66b0a4ac2aad3691efa

  • SHA256

    10387a9278516f1083c4307c0ae1bc3de03ee4409bd8966f6a4ded85573bd379

  • SHA512

    af6875e7628f4d6101bca5d090fd208fa32d31f43fff1897120ce7b49ef9373f390b86673981aec6151387ad76924b160a1eaf9457161d76ea86f19423bef86c

  • SSDEEP

    1536:u8TKdA36sv0W7TYcqerHE4aX67SBOpyLTlVnxNKgYQv1buDUDw7sa0GkR:ZTMq/Cb6k9FVnxNcQLasa

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@bigdaddytrade

C2

94.142.138.105:15111

Attributes
  • auth_value

    21ffe7cf446e27ee901289a71b1acc38

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 620-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections