General

  • Target

    1672-122-0x0000000001DE0000-0x0000000001E10000-memory.dmp

  • Size

    192KB

  • MD5

    7d6fdcc9c8774aba86a12a0daf413476

  • SHA1

    20f3bfbcdb74dd6cc8b7f59ed3f8fdce1971a7b4

  • SHA256

    d067de25c5de51b3e0c1e8fdaefc07ea935f77976c1a76a629a99565657b5fa3

  • SHA512

    b6035b70ce3b7f5f1000f1b72f3a8643b8e12fd68e398ed589b8a1c717f738bae74c3b970c161f5f6b7580b7030368fd1b596486b6d7a98d5c60107f2a5eee51

  • SSDEEP

    3072:pEV5bSQxA6IldyYxN3KVaxLzzUY472Q8e8h9:pEFAlW8TLzzUY472Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

novak

C2

77.91.124.49:19073

Attributes
  • auth_value

    31966dcd1c6ca86e6e8b0a259f9d8ffd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1672-122-0x0000000001DE0000-0x0000000001E10000-memory.dmp
    .exe windows x86


    Headers

    Sections