General

  • Target

    672-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    dd10f8f69b7b877093005d88c6e91579

  • SHA1

    05415b46550c02f80b7726d5e8100b4c807ee27c

  • SHA256

    1a55bd1b616527eecabe1fd2d1b1bf1ddbf5980bfd839d3d1ca66d0489fda5fd

  • SHA512

    1753bd8d56e75b1b01e989ad47a9325382b5aff67b5ed3abfe66b43cd6a1bd17d22d8c0be24dd6c037c3eaef7dfa5f7ec6756f01f596fd2fd3c18ceca75791dd

  • SSDEEP

    3072:TAWi/g1IzuRb5xNAKY73zOyuj++0s8e8hk:Tzi/+VCHuyuj++0s

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 672-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections