General

  • Target

    768-97-0x0000000000370000-0x00000000003A0000-memory.dmp

  • Size

    192KB

  • MD5

    9b7c458bff59eab6b0614a7b12785978

  • SHA1

    86c8d85f0ba776815a5964a931f60e5b972969e7

  • SHA256

    96b9adbea0b6dfe203349a534625d09794cb769a5cd86a0e79d77816f1b066cf

  • SHA512

    30c15908d45916783a66066dc44daf727d34ddfb1eb86d289a52ca8314cb5d7486be70e9acbc2c65a724a4f907a30199aace551ffe3de574050eb31a193477c3

  • SSDEEP

    3072:ptE62xyQ6d+VeXdxNLgVK880EH+8e8hK:bEmOA9S80EH+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 768-97-0x0000000000370000-0x00000000003A0000-memory.dmp
    .exe windows x86


    Headers

    Sections