General

  • Target

    1556-85-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    e85512ea33fe3c588871fdf4eac8066e

  • SHA1

    a9baca1e7a0cc19a86d66d3241b9cf1af020e306

  • SHA256

    6d46d5e8d1f2a17916c84ac1687b5cc5f09998d6779f78380d7567412c1666c1

  • SHA512

    3d8e040ecc53536d5278258443035db62b5a05cf321f784d97c083fcc6a846b8ca504f21ed11f6326d020374a56786eb3a83159add482b4f8f8f2abe8471cb17

  • SSDEEP

    3072:omM6LOe+6rxaofZJxNa6QGmiG82308e8h6:oVerbfZwAG8230

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

top

C2

83.97.73.124:53

Attributes
  • auth_value

    053e5ccc53982413753b68419138b23a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1556-85-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections