General

  • Target

    2168-122-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    9a49b0c3ac94f96c1ece42c43d45cd27

  • SHA1

    64c3c794b18855ae273f00a4e6193d434a323a50

  • SHA256

    060c252179b9017c5f08d608ff584d3d5aa34614bc4cac5910025e5d36d23901

  • SHA512

    fa53b172690a952666bfae7b2b123a87ba5b6b820124c557031c0477ae3ccd4bfa3f56ac5dcd3f3805ce180c6f01e4698b8b560cbd49167fbef7167afd8e9ba5

  • SSDEEP

    3072:jO64zyFlJDGx0HqSYxNXUfMim4G338e8hE:zf1s0HZ8em4G33

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2168-122-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows x86


    Headers

    Sections