General

  • Target

    1692-71-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    512162c557b3b02e1ec5062cd554f436

  • SHA1

    dba24ce67f64e30664ff68f3903c2473694427a9

  • SHA256

    f42da25d7cd829bab1aa89dee3bf5e0f32192a6bc93d870de80abe577f48dbde

  • SHA512

    80d9ad106c16288d3a3b01030adf3fafbc3a36bb6fef2cb32865d13d9e157eadb520231be9c8e142d2faebf3fc936708e7f92af0500ba89047f7e1eeaa8064b5

  • SSDEEP

    3072:JAWi/g1IzuRb5xNAKY73zOyuj++0V8e8hk:Jzi/+VCHuyuj++0V

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1692-71-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections