General

  • Target

    1676-123-0x0000000000340000-0x0000000000370000-memory.dmp

  • Size

    192KB

  • MD5

    4db878abf60eb087f5f9572f0abc4637

  • SHA1

    090a4ab127693d56c6a21f6379442b024c3b8e75

  • SHA256

    a1516e77add76dd7ab36d2f4500aaf3b60b0681c3d8a9b39081931a66fad24a5

  • SHA512

    6231b40f102a57bea97477df30af3249aeca1590091ed3d2160eb5b7bd9136272e84bb1f3d8cc8e499bec02ee66f77f78fee32aa09590720bd689b303bdd3358

  • SSDEEP

    3072:UUUEa9Te3JQBf8td3/oxN1ULH0ty38e8h4:n7QRyi1ty3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1676-123-0x0000000000340000-0x0000000000370000-memory.dmp
    .exe windows x86


    Headers

    Sections