General

  • Target

    1864-123-0x00000000002F0000-0x0000000000320000-memory.dmp

  • Size

    192KB

  • MD5

    a46aaa9959c1d27605d29bb496ebd47b

  • SHA1

    293fe2dc0a3cb961c04942e406e1d37846e5806c

  • SHA256

    bbb975e0e081209dc695a759bbdfc6e8f22726bdd97d68908090a75ae66cf7df

  • SHA512

    0156054c4e79b5c5392928185dbaad743fe434374abf703c74cb3f3741fc9facde6c84351e84cf2d64d52b7c8c000d6d0d183e67ea9c06692becf9216bd71211

  • SSDEEP

    3072:ZUUEa9Te3JQBf8td3/oxN1ULH0tyy8e8h4:67QRyi1tyy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1864-123-0x00000000002F0000-0x0000000000320000-memory.dmp
    .exe windows x86


    Headers

    Sections