General

  • Target

    912-55-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    1db684c9302de6c4be73abc0ca3c1634

  • SHA1

    7bff49c079b8bf9bcfa3d3b3ff6dce3c074fe026

  • SHA256

    af94a07712cf38afebe011ab20d9f09b569050285c5e3e947c824994751b794d

  • SHA512

    dc028c038ecf1fc29239a052cfd9b8a7f01c4f844af2960f15f98970ee6bfab43f44037024a2f8796db4ddba4a6153e1dfcc4cae56a28ede73c5e077e47b3701

  • SSDEEP

    1536:4zaZ/DG36sv0W7TnUuYrHYTMXJC9DLYsxN9TYQf5buwdtTmsJH30GkR88e8hq:4z8LwUgwkx8sxNiM/5xJH3/8e8hq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1red1

C2

77.246.110.195:8599

Attributes
  • auth_value

    743c159c0234992dee4975bf5855347b

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 912-55-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections