General

  • Target

    1336-163-0x0000000000450000-0x0000000000480000-memory.dmp

  • Size

    192KB

  • MD5

    303d643c1da033d9b312a0e6f2227a4c

  • SHA1

    71e08bd3b51e26aea74cf3b5bff6b9279b35dde0

  • SHA256

    3e57d715aa4f72f82a8c5c093f5c0e76e40b86bee6c48731fa408a9be33db01b

  • SHA512

    260e2238f25cce4c189037531c084b5c048c44b9a4fb3461491f245ceb5d4cebfa8d69e0d79608c35b15bd7af8a7ae24fc1b99eb71e775d79f7e57e2be90f75c

  • SSDEEP

    1536:aLX0x98OG36sv0W7T6lgorHsDkIQy6HFnxNbAYQL5bub2XRSb0KM0GkR08e8hC:/Zw4+kIIlnxNbQRw0KM38e8hC

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

jason

C2

83.97.73.129:19071

Attributes
  • auth_value

    87d1dc01751f148e9bec02edc71c5d94

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1336-163-0x0000000000450000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections