General

  • Target

    3888-270-0x0000000000560000-0x0000000000590000-memory.dmp

  • Size

    192KB

  • MD5

    1c61392f09f889f52363a60c5eed58a3

  • SHA1

    4436e15174244d945457a4459609df7671ebde8b

  • SHA256

    61e1c4de03f9509fd411ea0356efaae79abade4c23003945cf35baf066d20f87

  • SHA512

    3d570f05dffc1b82c6e7efe59c50f6d0b6beb0a1b35e36aa0d1fb4454d3383bfc4c239f88d90950cb4264d33265eee31b3b0e2e174138dea78e94f4b75e9a099

  • SSDEEP

    3072:DtE62xyQ6d+VeXdxNLgVK880EHR8e8hK:hEmOA9S80EHR

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3888-270-0x0000000000560000-0x0000000000590000-memory.dmp
    .exe windows x86


    Headers

    Sections