General

  • Target

    1052-118-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    6613117460f7c5bceb66cee12869fcce

  • SHA1

    36c6a6d442f5f43977130a0d455b67af59076393

  • SHA256

    b997ec01dc4cab9dc687e56a2b7dcf09e61df58d2ff755220c67192c780280f7

  • SHA512

    f581b195d79d4638d2967384bb3cf2ec21ea5524c77fc56fec5a7750ee2fd40bedafb8758d0d6fa8f66157623f87bc24fd2f9c7082115216768d0dc6a5803c8c

  • SSDEEP

    3072:wi0IDvSs8p2hxNHeMqnm4XaSK0ghW8e8hD:HJ91QLXaSK0ghW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

droid

C2

83.97.73.129:19068

Attributes
  • auth_value

    4e534d26d67e90669e9843dbbfac4c52

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1052-118-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows x86


    Headers

    Sections