General

  • Target

    692-154-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    fd81743077eed866aa547379bb90e813

  • SHA1

    820b832ebb4f9912b068bbde4333ecaa0a8733a3

  • SHA256

    2d075d1371e0f63bb2a09ab77928d7403c0fe554ed4f326ee383e56ebdd6f390

  • SHA512

    ebc7b5a2c9ec9791005c4e1b9d142ab78cc8e434857d8d22aea3fa2525644a3835f5703013e0cf12e1207d43b87b946f9d649b3f6f109535a4930397da2ac256

  • SSDEEP

    1536:CakcnVHT1n/o3rpIw+f+WnAf14D/+DHvcVNhmLjffbV76/OYUy:HkcZZ662WnyymbYnmnTQGY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Newtest061223

C2

94.130.176.65:13400

Attributes
  • auth_value

    0d5b21a01b3c36239e3c9e30c1101ca4

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 692-154-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections