General

  • Target

    1328-143-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    0b4d80b68b9f7771aed000d96b527d74

  • SHA1

    b9efeaa433557d31a048ae6c0a79f4c5ae962274

  • SHA256

    a396963a5d2ae33db048f62ce2b7c3270af9246018840788319b869ff475c1fe

  • SHA512

    3023b70793e2a4efff3b5f36d9999a95cfbeec408815a272977ea02f3e3955685d226af155e199197e5d8d575d91dee7ec621d753051c59b137bbad9b98c168d

  • SSDEEP

    3072:2ZtDiwyqSVghBGfAGtTjxNKifvWPxnX8e8hy:yibuhM5ZmnPxnX

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1328-143-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows x86


    Headers

    Sections