General

  • Target

    2076-83-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    7d7bf4b6304e4c8b082791c20549902b

  • SHA1

    8c12f88072b680c6911063a45038501125d8c14b

  • SHA256

    636e8f00d6008839f73bed1307f05cca103da8143f1b3d1d5d6f4f06fa5808b0

  • SHA512

    ceba78dbc95bb36e308855b613a11fd1e28448146127c9deb8636881f98ee6e1198407e2c282797257eeec897a9b3a1538116caeb1b4e0e478b9e4b16842095e

  • SSDEEP

    3072:SN9zgaHeuGhriktrBxN3kuZ+zdzT8e8hj:o9Ie4rhTodzT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2076-83-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows x86


    Headers

    Sections