General

  • Target

    1644-97-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    1af1aae98cee2c105fff3363d19f0981

  • SHA1

    3d8620e39d3b5ec966451a4082bb6d05d2efe2d1

  • SHA256

    81d4ae18c28d9f381916a14eb6655df2f3adb9b624920fda1c43bca9e128701c

  • SHA512

    a01bc58985bd761726904d860c2343c71213cf0e1ec0f545af1e1bfb7a66652f07369249b8dda6d5457791243de51628346aa6491573909bc21c69dc175f0bea

  • SSDEEP

    3072:YN9zgaHeuGhriktrBxN3kuZ+zdzn8e8hj:29Ie4rhTodzn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1644-97-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows x86


    Headers

    Sections