General

  • Target

    1660-123-0x00000000003A0000-0x00000000003D0000-memory.dmp

  • Size

    192KB

  • MD5

    b72ade68e15e1ceaa5362e094096b55e

  • SHA1

    73301a486e0fb5c9bca576e277862381911acd36

  • SHA256

    1bc86aead90a68de6c647894997f66d663a4eb0d4fe0d2286ad7c312c425bdf1

  • SHA512

    c14c75a53894c75f26e3eb8416dc8f80e6af39cebf97f7e518847c21d66b579c838489e5bc052a23b6542263a3f08273e38730f9c5123255a314b93db0a99e6d

  • SSDEEP

    3072:AUUEa9Te3JQBf8td3/oxN1ULH0ty58e8h4:D7QRyi1ty5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1660-123-0x00000000003A0000-0x00000000003D0000-memory.dmp
    .exe windows x86


    Headers

    Sections