General

  • Target

    1240-54-0x00000000002E0000-0x0000000000306000-memory.dmp

  • Size

    152KB

  • MD5

    1849ce011c0de7ec0350138ec36ce5af

  • SHA1

    16cb33c58908b052c07342ec8ab08bbdf2ae5a69

  • SHA256

    d6d85f04e3a5756f94a037e9a7bd4f38cd10b1cd8e27d2f2991a41cd10fa6fa6

  • SHA512

    ba964d934a75a28d893ac4b17abb258a57a1343d2d2c144eaaf07e6f212dda972eb21f98a0b9e18e7392a54567a4495ea9a7d78eb9ab9fd94754d44fabc80bd9

  • SSDEEP

    1536:2aCGcnVHT1u/o3Q5O6+f7NWy4Gwgm9xhsjNQbV71/Oyo0sYgibfbFDKsR3:zNcZZgKjNWHGgNigvGXYgafJl3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Stukaet norm

C2

176.123.9.85:16482

Attributes
  • auth_value

    e17d5b50c8677846b89ecc4df0b71358

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1240-54-0x00000000002E0000-0x0000000000306000-memory.dmp
    .exe windows x86


    Headers

    Sections