General

  • Target

    904-83-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    b7e916323f94f575c847267ec6cde82f

  • SHA1

    80118371889867692e98d30164faee627149c3b8

  • SHA256

    cd3bec44fb88de087f082f9127605455454a8be62378e04171647b57ef288194

  • SHA512

    b52c809961cb81c6e2db1e63a192e46fbf412c3e1a40298636b39a472b5727e018d2745523054d551120ce05ae8e586b7c0453a33c03d205105276406ca9cfdc

  • SSDEEP

    3072:aN9zgaHeuGhriktrBxN3kuZ+zdzr8e8hj:g9Ie4rhTodzr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 904-83-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows x86


    Headers

    Sections