General

  • Target

    32-273-0x00000000006B0000-0x00000000006E0000-memory.dmp

  • Size

    192KB

  • MD5

    bd9de7dce1616d3e221264ee6195eada

  • SHA1

    984c1f081ae30cab6e5bc9a2affa1b90cc27534e

  • SHA256

    adda4541cc62505c4f16f091b1c4a1d9bd34192b8d89985c21112f2f10cf7713

  • SHA512

    68c1a992fbdc6e3b6ff182e99f9cd87baa6b4285be5cec8c1786b2efe676cf419956d7908cc7e90f9089a64efd5ab9dd8e1e55d32862bd19385b048fd8e41e10

  • SSDEEP

    3072:ctE62xyQ6d+VeXdxNLgVK880EHy8e8hK:EEmOA9S80EHy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 32-273-0x00000000006B0000-0x00000000006E0000-memory.dmp
    .exe windows x86


    Headers

    Sections