General

  • Target

    836-122-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    9a9b6ac98053e568c6713c113f213204

  • SHA1

    58074673ec253abc0afdcdb3988799db3a1e17a8

  • SHA256

    8787465b461b5275376523859d6c517c238cf8465c14e70ef68869fa31243a91

  • SHA512

    0baa8ee495a7bb85899ea59af833ccfef04bb0cb7af1423f8fe146efb940707f4cc478066b6e1e9da82ce1dc91f0235651ac65e7116c7d2b57f1fe8826896974

  • SSDEEP

    3072:0EV5bSQxA6IldyYxN3KVaxLzzUY472g8e8h9:0EFAlW8TLzzUY472g

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

novak

C2

77.91.124.49:19073

Attributes
  • auth_value

    31966dcd1c6ca86e6e8b0a259f9d8ffd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 836-122-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows x86


    Headers

    Sections