General

  • Target

    1436-271-0x00000000004C0000-0x00000000004F0000-memory.dmp

  • Size

    192KB

  • MD5

    3e95c2e75fe2ab37c8889368a7e52715

  • SHA1

    1149a9afc7c127f25ff60f4af7497dc7e654350a

  • SHA256

    a9b46ea3bef9d4671f1042505e43f59c37a72800a8e3267d1ad7be88b93cb294

  • SHA512

    b15ff29139a46804844fd7f2bd00b84a3b36b78f21e1e4f90f0ee90657e9f1b37cb6b718e14c9df67294155a028989b4b7435212200ba63960a1a9fb43a22488

  • SSDEEP

    3072:6tE62xyQ6d+VeXdxNLgVK880EHj8e8hK:WEmOA9S80EHj

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1436-271-0x00000000004C0000-0x00000000004F0000-memory.dmp
    .exe windows x86


    Headers

    Sections