General

  • Target

    432-122-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    87bb055df7dbf281e84803e53b5c449a

  • SHA1

    be46e86a51fcace99cc1215417bc66f50e48e5ac

  • SHA256

    8f09c39f2ae5e0554737573bcdbcbd32d31db792ab18250a8619bdb9a9685591

  • SHA512

    75c0d238ba7b502bf4ab5c46ad2731721f98ab691996b19f1c9f6edd15c784c24009e49c005a83c3fac7b2fd50f163730473c3c864047e44e206fb6d734f1205

  • SSDEEP

    3072:qEV5bSQxA6IldyYxN3KVaxLzzUY47228e8h9:qEFAlW8TLzzUY4722

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

novak

C2

77.91.124.49:19073

Attributes
  • auth_value

    31966dcd1c6ca86e6e8b0a259f9d8ffd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 432-122-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows x86


    Headers

    Sections