General

  • Target

    1476-83-0x00000000002B0000-0x00000000002E0000-memory.dmp

  • Size

    192KB

  • MD5

    fcc3b35ff8890f442015e17379445da3

  • SHA1

    90bf2fc9b5d006faeceda389689ad759f9f6c34f

  • SHA256

    e2b35ab5726a6c9e61bf6b463fb346e1ede401cb27f7c0f1150aecf279269f1b

  • SHA512

    26084c732fb4cdf6989b6dad947454b5e8091df0e7c6fdd984605b8197751aa507e3b920c0291cc7ff5afceb9b663dea7a96872b1a894bbe9db8ff5f8564c3f0

  • SSDEEP

    3072:TtE62xyQ6d+VeXdxNLgVK880EHy8e8hK:REmOA9S80EHy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1476-83-0x00000000002B0000-0x00000000002E0000-memory.dmp
    .exe windows x86


    Headers

    Sections