General

  • Target

    1644-54-0x00000000003C0000-0x00000000003E6000-memory.dmp

  • Size

    152KB

  • MD5

    da4331b9ffc6c6308fb21106bb183f7a

  • SHA1

    9295d2baca8064470315c5d9e5f7c79e1e972e9f

  • SHA256

    1ca2067911335489a2f91ebc6c57f4f34946da01755e07146ce0d292da43717e

  • SHA512

    99989c293f083aa703e264a796812493844c386d0484e6f66753c26b97357061398e75807f06fd3e466a6b363218acf068c19d9b9a52cff78051ed6e0dc7f8ec

  • SSDEEP

    1536:FaCGcnVHT1u/o3Q5O6+f7NWy9Fu/OYmtZhZja9bV7e/8H72msYgibfbFDKsRq:INcZZgKjNWgurm90NU0H0YgafJlq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM LOGS

C2

176.123.9.85:16482

Attributes
  • auth_value

    63cc484234216dace4114bc03617721b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1644-54-0x00000000003C0000-0x00000000003E6000-memory.dmp
    .exe windows x86


    Headers

    Sections