General

  • Target

    2040-55-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    1fe09196fc0c05bc08ab554493be4004

  • SHA1

    24d5b8f6082077c35dbb9605cb73eb3ec0aca69e

  • SHA256

    28c700081637b4bf16021eb6516a51cc841090506f958b452f2291cb3828c444

  • SHA512

    6c87122e1c53260a267638b297fd7b9288ff4720e132c043b6acdedc8abf879be75e2928fabd3413788639747b9b7a8db80ef0d39bd5a199de5bda84d5b4c42a

  • SSDEEP

    3072:jhQl5dZZijmGMExNS+yenXbZq7V/Dz8e8hR:jh2ie5eXbZq7V/Dz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

2

C2

95.216.249.153:81

Attributes
  • auth_value

    101013a5e99e0857595aae297a11351d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-55-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections