General

  • Target

    4992-280-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    e483ed51583df778605d3393c283e2b2

  • SHA1

    de795c3965a30effc24ccd498af69fdb07c02d02

  • SHA256

    68f854de64f7998c1cb5f9a6b76f597c76078b19d574fd2b5802c7fcec168ebf

  • SHA512

    77845b8603cf9b7c02ab7bf53cf9e5a7c2deb793ba0a4b4895591d1d38c2e7d8a8d826cc5f4c5a3ea420acf1d9c80c595fa94661568465d60c6db369d011bd59

  • SSDEEP

    3072:ptE62xyQ6d+VeXdxNLgVK880EHk8e8hK:bEmOA9S80EHk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4992-280-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows x86


    Headers

    Sections