General

  • Target

    1680-56-0x00000000020C0000-0x00000000020E8000-memory.dmp

  • Size

    160KB

  • MD5

    e5f5ec007d0fc2f0ddfd62bc12a310e9

  • SHA1

    15cf2fe90e9f5de7d7b61f8bef0ff88b78103915

  • SHA256

    134228b279a4741d73ae1cf9efd4e760be74a2d18a569af5afee28dbfca27599

  • SHA512

    d6f6f52546810dcdeda07c8ac65e5639df36eddd38c75c9c5872c4879cebe066f17c2029e4a08aeaf1dc2f65e056c2ce89612c94e0af76da398e22d0f8298d4d

  • SSDEEP

    1536:OKqOtN6ba7o5LRsVq3WU1+L5+bYvThMYw69LsYgibfbFDKsRd:OeQrs7UoLYuh5KYgafJld

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.81.68.115:2920

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1680-56-0x00000000020C0000-0x00000000020E8000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections