General

  • Target

    1296-61-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c969e7e96c2c4d44b2d56a275b4fddfe

  • SHA1

    8c1e2691507df5588a9e88cf2bed26f9f8f21042

  • SHA256

    f259831cf0c8121215593faee68481bda26920dfe70dd28e3222683bc8a5c3f7

  • SHA512

    9e5a9cb1f7f49a1e70d0c7fb313df8e8a740c8debeb0ce5cb291c5a3d031399056a5bb56af9ef54d7dc64ed2d038111c9f0b9479307ed549787078dd1d4069a2

  • SSDEEP

    1536:JQDe5h36sv0W7TGX0bfrHKg6rW3aG/XlsdxNOrYQPTbumY1r/Mv0GkR:JQDEPWMH6Cf/mdxNDGIrMv

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

build3

C2

101.99.93.194:28049

Attributes
  • auth_value

    18289090273141f0d948c8571bd12eb2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1296-61-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections