General

  • Target

    1732-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    bd9e0b88d342f0117b8b790ebfcbb4c7

  • SHA1

    8587c08b174bb71a84caf5bd2a52335c47f7ba63

  • SHA256

    e871667a01785a19646bce5d338b7820e2ade03c80d77a6977e3e7a054402c76

  • SHA512

    4ac8a7985aced4a25dbe342a12753dc7c971af8e03118a83a5a70de9dc0438e205a54d37bb3b2f9debb6621fff4a4693c670e77bf18aca007872d8cd79331b83

  • SSDEEP

    1536:27QY5RQ36sv0W7Tt/zk0rHksLwSWrW2/HSm3/ezxN2t+YQxjbuf48jatyAR020Gm:UQYzaRKsJWrWmHezxNUQ3satyAR9

Malware Config

Extracted

Family

redline

Botnet

build_FINALLY_4_rebuild

C2

195.133.147.56:26619

Attributes
  • auth_value

    b84e18211163edd519d63cb2374aa8bf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1732-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections