General

  • Target

    1320-54-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    f3533d132cada72c995f3219c117e608

  • SHA1

    2bb68015b24de8af730fc20e26ea4d7576962f62

  • SHA256

    4a1b781a008157fae7c6f56d5f1230707e3bf03f7599b3bd064048f144e58626

  • SHA512

    2f9e5b6843f20cfc0e5fda31f5df82eb9b53f16425461f1873c1417527ba462fad199c4130bba9fe7b38e1b79baa470a8d35b537b8c0d3c67681cc95f7e97d83

  • SSDEEP

    1536:xbuR0C10WqlVZRGWyuHrTog/XzMXMQ8ys88888888888888888888888g888888+:IR0feoog/ZpyqVEUCidWT8FU8e8hQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1320-54-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections