General

  • Target

    1056-54-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    211015ede0743dbd3819ca5dc4e83f0d

  • SHA1

    45cccb08bb195a2d7f5714a1169cfedd73063c4c

  • SHA256

    e7532052ec493a1bd33da3c982655362a8733d8bf296aca7f5ff2fc46c560ad2

  • SHA512

    2b68fc79efdeff6da577e8f98e46916fbc453b671ffbd73b78199a5705b5f6f31a7b911c8c5f428348d563640e7c8448c50e4bf69a5839944fe46408ef312e09

  • SSDEEP

    3072:XtE62xyQ6d+VeXdxNLgVK880EHu8e8hK:9EmOA9S80EHu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1056-54-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections