General

  • Target

    4984-270-0x0000000000560000-0x0000000000590000-memory.dmp

  • Size

    192KB

  • MD5

    270a4096b46c659ca953858aebd21026

  • SHA1

    bae8614a101057c4baa31e5f0dca163460b4ceac

  • SHA256

    8dad25941b0d297332a9398df88b6ad50a150c19b5370e17baf9194d9d5cd7fc

  • SHA512

    48919c543b33e184d1a874ad8bc9170b77738978a9f95ac09247818d31cefb354f483433bdb59286ca14b6d4092f34cf0e5dc2e75d4891f7ae3c7f38c19ed9ae

  • SSDEEP

    3072:ZtE62xyQ6d+VeXdxNLgVK880EHR8e8hK:rEmOA9S80EHR

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4984-270-0x0000000000560000-0x0000000000590000-memory.dmp
    .exe windows x86


    Headers

    Sections