General

  • Target

    2088-146-0x00000000001D0000-0x0000000000200000-memory.dmp

  • Size

    192KB

  • MD5

    ebbf6f709cbc620f066c5994139846ad

  • SHA1

    4058879a6b6d53c77afa6f1e12d818a3a179a288

  • SHA256

    a8adfc3b6a317b74b8df87d05f74fc1c8445644cd812af90096afbc379523a20

  • SHA512

    2c33aa41a55dc28d09f1dcdc61d7fa01c3397eda7a0146575ab5d9ef2b7e46a0880175f2ab109fbb795e6c12ebba6a222ce15036b1ef61753fb75372235662e9

  • SSDEEP

    1536:NhADkhez36sv0W7TXL0jrHCOXiyfiLhwxNPlYQPnbufbTRGFZ/Xh0GkRA8e8hs:AYwJ7hOXiqkhwxN2iGFGFZ/Xhz8e8hs

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2088-146-0x00000000001D0000-0x0000000000200000-memory.dmp
    .exe windows x86


    Headers

    Sections