General

  • Target

    780-62-0x0000000000080000-0x00000000000B0000-memory.dmp

  • Size

    192KB

  • MD5

    cda8e6e8859d1b6687ac6171ed5ecfa9

  • SHA1

    857e4f08829932d7b30b50f71306ed7c27dd107f

  • SHA256

    bc408fbc868073ca09b7e529508d667aa27213182422bd1b9d257952d9345b26

  • SHA512

    65638b414130de24cf9ce92d2c8ed3cd5a8366e9c34c88ebb64e1bc15c71633e74507c42f6b6ee2992ccc8e75f45bd852b207dd0e2d0afa2f75f8079759d0c00

  • SSDEEP

    1536:en1We36sv0W7TJ8TSrH0QWpzG+3GnD2xN2NYQPJbu7/Vmo3LXoFaAz10GkR:aU4GbQW1G+62xNt8GVp3joFaAz1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

BOGO4US

C2

94.130.170.166:35603

Attributes
  • auth_value

    29b00a081cd8397cb66aa7e6fc7aa4b2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 780-62-0x0000000000080000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections