General

  • Target

    1348-202-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    b172d42ff5ba2775194c18a0ce30a568

  • SHA1

    b7ba4fbdc3ffc911ba24241fdcd999bf01ec7756

  • SHA256

    6248fa82276e92f10bc316142531c7ab2f46b170d262a4cbf2c97fb50ae102cf

  • SHA512

    ed20775543b8fab81bd32de014e38fff42a07927ab71199e43677e2dfcbb5d00733c0528ea676ec495c6cd3950f8b31991fdd7d1e5a9be06bc637419909901ce

  • SSDEEP

    1536:0hADkhez36sv0W7TXL0jrHCOXiyfiLhwxNPlYQPnbufbTRGFZ/Xh0GkR28e8hs:bYwJ7hOXiqkhwxN2iGFGFZ/XhR8e8hs

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1348-202-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections