General

  • Target

    1520-122-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    3941e40f01ce27a092a957920a0355a7

  • SHA1

    e76e0ceb3cff2c64c439a1f8ef72d58ca6d12e5c

  • SHA256

    217a3d94910fdd2b1aa50a6cf654d9f53fb29484fa585c1e82482c71bf606115

  • SHA512

    15e34bbb04e8ac970b9166bfe07ad104a4ad934799b87589ce87a8f6110d39ef49bee25b36c79a32aca4c2661c5ad6a00a1eb6cecf478463fb0e503f6b087085

  • SSDEEP

    3072:EAF5KBstbkeNKZIhDDxNcaoMczCOP8e8hL:hXb33hDYjyOP

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

jako

C2

77.91.124.49:19073

Attributes
  • auth_value

    3db90f2679ab2890874898c7c6d65799

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1520-122-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections