General

  • Target

    1532-122-0x00000000002B0000-0x00000000002E0000-memory.dmp

  • Size

    192KB

  • MD5

    3d41d20ed686582a8b731a73082ac790

  • SHA1

    ea43f7416fbc1e52cc5cf4dc964ae0946f30f228

  • SHA256

    921cb0e9b20e39190f392b82c03751752e7761d39c600fee371efc3a885da50c

  • SHA512

    f1de6e64d43a65d90680765d18f15230fdd6d5ffa7f8a38c06a11e16ba4e7ce14840054a1a79b366c5a9d6009248698484eeed357517dbd47b0667689332df0e

  • SSDEEP

    3072:tEV5bSQxA6IldyYxN3KVaxLzzUY472e8e8h9:tEFAlW8TLzzUY472e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

novak

C2

77.91.124.49:19073

Attributes
  • auth_value

    31966dcd1c6ca86e6e8b0a259f9d8ffd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1532-122-0x00000000002B0000-0x00000000002E0000-memory.dmp
    .exe windows x86


    Headers

    Sections