General

  • Target

    2196-54-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    f1934a81a06336116ffcfbc72125d683

  • SHA1

    f3fb318773aeb148ff2e2e18d7db630c54ac8aff

  • SHA256

    f70f7a9422b0bfb734a800456dbaeff53ceb8ec82266aee9e1cacbcc403c012f

  • SHA512

    f9f201acba3661da1a078291f98e57e63d3a7b8395560076e8a87661b79ec2f168cc95c5cdd74f8c3152fc6e72e54a69c525b9b5c0e0fbccfa3e2449bb6e177a

  • SSDEEP

    3072:VN9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:b9Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2196-54-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections