General

  • Target

    1884-83-0x00000000003A0000-0x00000000003D0000-memory.dmp

  • Size

    192KB

  • MD5

    47bd79afbc449a6dd46497c64a1beb83

  • SHA1

    a501c5672c3e00e418f69121277e605b003ef08f

  • SHA256

    8324a45aea6605d41b01bfbcb738efea319ad8022bc9f5b1f5cb8fb1bfec91e5

  • SHA512

    103ccb88081286ef64437c0aef3e04f266eddbb2bcbc6632f07f80637574cb8e9127a47a69a16fda7e19c8c4d0ecca3518a6defd1efbeb0a1a5f4c9e959aed7e

  • SSDEEP

    3072:YtE62xyQ6d+VeXdxNLgVK880EHV8e8hK:IEmOA9S80EHV

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1884-83-0x00000000003A0000-0x00000000003D0000-memory.dmp
    .exe windows x86


    Headers

    Sections