General

  • Target

    660-83-0x00000000003C0000-0x00000000003F0000-memory.dmp

  • Size

    192KB

  • MD5

    7399a79265a5dcc726c5625f89da2849

  • SHA1

    ae43f483a140cf72318b108f67d3a055c76a7950

  • SHA256

    2fd2e928effbfbc6700cbdad7978c78e4162f0261295c124b01fcfc50e0e8574

  • SHA512

    de2e9f6be67c47842f8da87fb072cf17ef8b16aa31baabadb9ceae31ab3338f736189adcd2255f856b1aa1a968fb094809ee8fa7203ff7f160411dd0456d762f

  • SSDEEP

    3072:QtE62xyQ6d+VeXdxNLgVK880EHT8e8hK:wEmOA9S80EHT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 660-83-0x00000000003C0000-0x00000000003F0000-memory.dmp
    .exe windows x86


    Headers

    Sections