General

  • Target

    1768-97-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    32140321161b165db6fdc8a3aa5c208e

  • SHA1

    da093f8e41303ccdc4181c851e62580d9af31109

  • SHA256

    94e63cbf8b504c564480bfd5c9826ee394f4318908f11a99b7fd9608f5451521

  • SHA512

    634bd047a217ef7fe4c39c2dd904a943d5265cb8a55b2f1521084b13e4a423ad2b0f1d4650f10825d463a16def18c801cc545303d5ac906c0661be7c8810f57b

  • SSDEEP

    1536:ihADkhez36sv0W7TXL0jrHCOXiyfiLhwxNPlYQPnbufbTRGFZ/Xh0GkRg8e8hs:1YwJ7hOXiqkhwxN2iGFGFZ/XhT8e8hs

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1768-97-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections