General

  • Target

    2020-54-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    a1e11869874b3c1d74a912be40b5c6d9

  • SHA1

    0a549d975b7e6b3339857f79c1747a9e34e8d38f

  • SHA256

    1fd568d68670d83cc5e1b5bf2af09b2abe636ce480b696a156ea997dac3139de

  • SHA512

    42efb6e23193677a7de52203b6644d38b9f324dddd8204f2599fdc882e449d81f55f7f22da6c7140090613e38ad70bdbb6f400eefcff603bffc68e723222ee93

  • SSDEEP

    3072:1tE62xyQ6d+VeXdxNLgVK880EHu8e8hK:fEmOA9S80EHu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-54-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections