General

  • Target

    1944-97-0x00000000003B0000-0x00000000003E0000-memory.dmp

  • Size

    192KB

  • MD5

    ac05f25def6f93bed84e8ca155c0a057

  • SHA1

    c96ff6dc5e93b59b4311a4678fe162495fd1f49b

  • SHA256

    5cb6430d2925235a254db0533a20e580dbf39c5f50b03f95fc61852b2fa91438

  • SHA512

    6d2d66ab32a8b531c6309097c507f422b0562e8da804c52ead78bab232e6ab747b08d99fca1199371f9c16729667a72ae023f2a063c7b05050447a57685bad77

  • SSDEEP

    3072:PtE62xyQ6d+VeXdxNLgVK880EHC8e8hK:lEmOA9S80EHC

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1944-97-0x00000000003B0000-0x00000000003E0000-memory.dmp
    .exe windows x86


    Headers

    Sections