General

  • Target

    1428-123-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    6323bd6f4054860d7251e3b9d769ef05

  • SHA1

    d207fb6ff71c4c6501676889ea35cd1fd2c721d2

  • SHA256

    733b4992bdfe043b219ef25804bc33b84613941eb866dd23059207bbcacdbf78

  • SHA512

    f1315bffb30dc16b39ed1c7e233596615521d5276b3c699104ce3642232abb81c4fcc5131bc6a4fd02ee20f8011f63692445d0da6d07e3773c5be4d03fc09c8a

  • SSDEEP

    3072:IUUEa9Te3JQBf8td3/oxN1ULH0tyo8e8h4:L7QRyi1tyo

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1428-123-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows x86


    Headers

    Sections