General

  • Target

    4444-145-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    703f3216cba8ac4cb5f453e96cf207b1

  • SHA1

    005d22655fb14231567fc6d9bc576cb4366b9940

  • SHA256

    ff63b0463666abe8bc40c3cff4fc0c43f0de62b847592ff7ad6a6c9f5c854943

  • SHA512

    3921d22d1bf2d045cb680a973d58449e20fe66b8dee3d57073af4854eb05d5b7f414e37cb278dc39f45cd75f32f85fe4ff86f1781d27063552d6a55c0ec4ffb8

  • SSDEEP

    3072:omM6LOe+6rxaofZJxNa6QGmiG82308e8h6:oVerbfZwAG8230

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

top

C2

83.97.73.124:53

Attributes
  • auth_value

    053e5ccc53982413753b68419138b23a

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4444-145-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections