General

  • Target

    4120-270-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    80a1745607baf1700d1fad1ba74067f2

  • SHA1

    708660d3d3df5232c0c558ba7781c20fd8f0fcaa

  • SHA256

    11c7a554717301f3f55f10f857a4681abfc6e8585ef666657e0635c13a9f5283

  • SHA512

    aa99630f771a810cfcf5fdb958f0c0730e875802db15b4e0d4351230d6bbe70d066d28a28678a27cf0ddb2761a9c753de2d7683713598eb8cd5a21d5e73926a2

  • SSDEEP

    1536:ThADkhez36sv0W7TXL0jrHCOXiyfiLhwxNPlYQPnbufbTRGFZ/Xh0GkRD8e8hs:qYwJ7hOXiqkhwxN2iGFGFZ/XhQ8e8hs

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4120-270-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections