General

  • Target

    1120-83-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    74678ccc769d92f3f56602f9ae36225d

  • SHA1

    30de592896c109d040004d47442f4ee29c00d065

  • SHA256

    6467e415632f8184b2c65c54b0c96a5b79340f1e33ce741da42043768118fad2

  • SHA512

    77307933aa34e4d442adead3270765df3f4e5704bb3ad3f186a76fb9ad5dcd2b92dc3dd454de546c4bf79d9fd6da6cdc7f2f232f368ecf3c3cce15df9e0d90a3

  • SSDEEP

    3072:qAWi/g1IzuRb5xNAKY73zOyuj++0r8e8hk:qzi/+VCHuyuj++0r

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1120-83-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows x86


    Headers

    Sections