General

  • Target

    648-122-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    dbdc91fc20d0b421a8ffd8c16a8eb598

  • SHA1

    8e69189e6168cd8c47500e0c709c3ca28827698e

  • SHA256

    cc2e8b9c4c82d36dea3ad2a03c2dcb854bc362b60c9a1dc352deb991b4c14fbf

  • SHA512

    fd53fa7eedd279a9935bfaee883578c1f429ea01cbc91f0edc6a5e9a52ebc1db356c4573b36671a068b6d77f2ad957e39ae92f1173ea2ca050cafd8a9aac0520

  • SSDEEP

    3072:AEV5bSQxA6IldyYxN3KVaxLzzUY472N8e8h9:AEFAlW8TLzzUY472N

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

novak

C2

77.91.124.49:19073

Attributes
  • auth_value

    31966dcd1c6ca86e6e8b0a259f9d8ffd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 648-122-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows x86


    Headers

    Sections