General

  • Target

    292-150-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    2978680fd40c532452a11c16ddf54a0f

  • SHA1

    d46f7680595f5f4d47acd9c0e1bdca4f6153d5df

  • SHA256

    3920a39f7220fbcc46bab9472c482cae9b01fe2c7df92465a8e00a6bd4b12195

  • SHA512

    7e00d0f6fd4993395b3eeb61559a9dea0446e648703e6deb2f6c747a09ed39a62ced5386a4e68715788ac819698d6327847aeccd61d95a539f9c96a1cc92ff3d

  • SSDEEP

    1536:o6zhq36sv0W7TzGrWNrH8/GpICOS6rxdAvQfL9JxNSSYQv3buoiGEviG8230GkR:omM6LOe+6rxaofZJxNa6QGmiG823

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

top

C2

83.97.73.124:53

Attributes
  • auth_value

    053e5ccc53982413753b68419138b23a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 292-150-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections