General

  • Target

    1248-185-0x0000000000090000-0x00000000000C0000-memory.dmp

  • Size

    192KB

  • MD5

    72e72f1ba4874a68d71d1455591b7790

  • SHA1

    dd16a3f5bab66eacb6e18943d9df0664e8c34ede

  • SHA256

    06880c4c9da921eaa67aa9f7a8dda426f41363828687163e9a357ed296a8da04

  • SHA512

    71ead881b187039acf28c2dc0e0776f27040ba05e6c33b9c7509ed1bdb1efb4cc12437829a5ff37c59c605aa98ff3bffcb952433606224ce8c07a8ec15cfac29

  • SSDEEP

    3072:IugKpIKa2ZAUe2Bp4xNC25XS+0Gu88e8hO:Iu35ZAJgpJ470Gu8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

newdomenbuil

C2

urelishavea.online:80

Attributes
  • auth_value

    3f57eb8802ec1ee7acaa6e6da0537c27

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1248-185-0x0000000000090000-0x00000000000C0000-memory.dmp
    .exe windows x86


    Headers

    Sections