General

  • Target

    700-84-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    5d83e68aec835ae5ce025353cede1e68

  • SHA1

    3e0a5719362330d39e923d06a13d7b53369a75db

  • SHA256

    19df2f304126d5f8b57c6511ec605baf0ea75a07c47c6d0600ed4fa9a9147483

  • SHA512

    4d95677853f1ef1f8fa56b467ea4cf1f3e1b91f65561fd68453de642121f76e7431a4471c21d926f212fa5236ef50086d84d8ca420f9e468c21044c5b1157ee0

  • SSDEEP

    1536:BaKcnVHT1+/o8I52C+fbluaL4VD/7Dcth+jvvbV71EOYXisYgibfbFDKsRj:sKcZZZajluAyzgHGjTpKYgafJlj

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyla2606

C2

168.119.239.218:36938

Attributes
  • auth_value

    7527b9f62058b03b6b592f42842aea35

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 700-84-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections