General

  • Target

    484-83-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    49c7a2d491cbec826c1b0e2177a6efe6

  • SHA1

    d79f22b1789611481891ac7a3bc0d31d576054a4

  • SHA256

    cec52cf181b2f6a4b37745627a77ccce20c84b221fa3fb4055f9cb70ed7853b9

  • SHA512

    cf43cc59ea6d49a6ec251d479b39e51d00fd4db559bf8cd6031317cf9f3adc87ed5ff2a156aa6430de1dcacef5b6eb66814f2687c77c307515fa6ec75465d235

  • SSDEEP

    3072:uAWi/g1IzuRb5xNAKY73zOyuj++0r8e8hk:uzi/+VCHuyuj++0r

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 484-83-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows x86


    Headers

    Sections