General

  • Target

    1644-56-0x00000000000C0000-0x00000000000E6000-memory.dmp

  • Size

    152KB

  • MD5

    ef6e074b89e4af04699abc3b4d880d37

  • SHA1

    b073d49948c39482abaab0b22eb6739ee898d420

  • SHA256

    d92b9262e90d7bbd276ed8556cadda4bb231b97169711f99a37f6c957472384b

  • SHA512

    3c555766cd03512bfb3f3a4ae6880c3ee80e1c76f303a349d1fcad3ca07aa7cd0d884a295f0f9a019b08e5db6d1e3ba627fb7ae10a313439c51f2db4465c4b4c

  • SSDEEP

    1536:+ancnVHT1X/o/XpkE+fewzAcJWP9DbCB16hej/FbV7Z/vWh:LncZZuaGwzABV6aWV/H

Malware Config

Extracted

Family

redline

Botnet

visavisavisa20.06

C2

65.108.3.31:17616

Attributes
  • auth_value

    89630833e84897761e35ab0e67ff9988

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1644-56-0x00000000000C0000-0x00000000000E6000-memory.dmp
    .exe windows x86


    Headers

    Sections