General

  • Target

    1512-141-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    4cd31d0d9e1905145a3d663ca4a13841

  • SHA1

    6c76a3a0bf16f7dac078a893de6b413b5bebc2bb

  • SHA256

    1c01915cf5f596641e5d3952ca2eacb8c7e85d658e69886abbbf8dfd1e53d7a0

  • SHA512

    6205fca55b9be0758306d0054c53bb018633c7f624a582a4014fec19c5c1b0eb92c390c0c67fe7b271d0a1ecb9649a7661f03af9e476ea4c2083a13f879a9b17

  • SSDEEP

    3072:2vtDiwyqSVghBGfAGtTjxNKifvWPxn68e8hy:YibuhM5ZmnPxn6

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1512-141-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows x86


    Headers

    Sections