General

  • Target

    648-122-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    c1a8281f202fdd6de06ed6cf3f01286c

  • SHA1

    fe7a395798fd9cf7bc2d1826e8545e6a0fe21b3b

  • SHA256

    298c8a730b81440142c663ed60f84b5bd0b4670ed63d67fdfc9e0b697b3c90c8

  • SHA512

    8446ec10df447c4e57ebfb55f3bc414995fcd6be990df09a09cf9809dc81dc8d1ecef10de647e1d03658b8f94e25852e89ce8f77b486f60d7aafde6b128aad7c

  • SSDEEP

    3072:AEV5bSQxA6IldyYxN3KVaxLzzUY472R8e8h9:AEFAlW8TLzzUY472R

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

novak

C2

77.91.124.49:19073

Attributes
  • auth_value

    31966dcd1c6ca86e6e8b0a259f9d8ffd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 648-122-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows x86


    Headers

    Sections