General

  • Target

    1332-54-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    0e1bc26d840ac9fc71ada31eafd9564f

  • SHA1

    17949505cbf00f2ca7e67cb0ad4ab4e2aeb8813a

  • SHA256

    ae2e832ff84fa1ef511a03247f9eafd0fd72867919ed5717d1b6257755220f39

  • SHA512

    4d844f2bc6e2a4b22b540f0c30f0eb62f39cc421abf665832d6f1022b82144ce1690e318031fdc827056b93c8db7b1ff99a49bcebcd2973edc87a80371a2ab82

  • SSDEEP

    3072:KtE62xyQ6d+VeXdxNLgVK880EHF8e8hK:GEmOA9S80EHF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1332-54-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows x86


    Headers

    Sections