General

  • Target

    836-54-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    3811846a9afd168861ef3ffdbe58abd2

  • SHA1

    3a229873b6e96a14871982eb0f65ffa1cf66acb1

  • SHA256

    b94d0271ea8d3e66e4b8939e7fe8834e72d70b6b0432c9915d3ab1fcd9b54b3b

  • SHA512

    2e0b31cdb170fcf8246e7b458ed624c2d54edf9582a22cfdba55f8582c4369b7c818fe2d46c7d19c9116f2f77a6798e68342b90214b3e920959a9e3916187fb1

  • SSDEEP

    3072:9tE62xyQ6d+VeXdxNLgVK880EHu8e8hK:XEmOA9S80EHu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 836-54-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections