General

  • Target

    468-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    3f4fe65ba068c012d069bc9513badc6c

  • SHA1

    08988f6bd734fc29744c964dbe1fdabe90798d2c

  • SHA256

    2a4e687501e08974043f992555cac8c6572f8e7d631c2a8197dc9b72e3b0c721

  • SHA512

    2843d5ab8a31ea40006dbb59734d64b38aa795e35a16ae7636033962388b278a9c10c0ccf1ab3bce9dee00aa7a0e57b435cc3e832de9f6e2d6f6a408f493d9b3

  • SSDEEP

    3072:FAWi/g1IzuRb5xNAKY73zOyuj++0s8e8hk:Fzi/+VCHuyuj++0s

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 468-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections