General

  • Target

    1788-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3732c6f9a2b9275b835fd3d8e1e4c83f

  • SHA1

    8ecc7a4c3d6a351a009f327d986a4b037df47cc5

  • SHA256

    bdadf43a3751b81e089530c24be5449d49d3b239952f7ff32ab85a0b814e262d

  • SHA512

    2f21df3e9f81434ce42242f89f89f3dfd4b912fd5b47870927c3ec7d17768ba0427180023336c3a8638608cbbea4988122e58d52d2c57a44753778a51fbdd74c

  • SSDEEP

    1536:GNH1mqlVZRGWwvrrUwpgWtEjOAF64qMTGqVwbub+mN6VkI4o83wYk:GNVsswpEjLFq1qVAtY6VkI4o

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

yt

C2

65.109.161.165:6997

Attributes
  • auth_value

    c85b149d6d3359b3fe4dd1dfcc5864e8

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1788-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections