General

  • Target

    3052-54-0x00000000001B0000-0x00000000001E0000-memory.dmp

  • Size

    192KB

  • MD5

    52ee4c48064af4d2f58c47bc21875a1f

  • SHA1

    9a5ad73c37602f4559a49e23e342f0ee30bb8cce

  • SHA256

    d7ef770463e46ab211a16d563c4ead1cbb5019f19408281c7fab7f79034637e1

  • SHA512

    9dd3af66b878409f525c8d6b4be67b7bb3ab5eb202ce6b3ae7b1efbe57b42dd55531dfab9d8eaecdb75befbec102a2239aacd37b8583188c0a6b0219ac62e050

  • SSDEEP

    3072:gN9zgaHeuGhriktrBxN3kuZ+zdzc8e8hj:u9Ie4rhTodzc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-54-0x00000000001B0000-0x00000000001E0000-memory.dmp
    .exe windows x86


    Headers

    Sections