General

  • Target

    2060-54-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    e538ca49ef9d4870ba161a63f3e95814

  • SHA1

    f12e65706051ea95d0e8b797242957e8e17ce206

  • SHA256

    e3f8e66b9821fbbee1a871365a07b32af5276a3806cc0e591dca718435f29b4c

  • SHA512

    2a7e28ec5fafea9b040a8e87293a0d1eecf5c6feccc28d4bf0cc9abfe044a241820bade2663d4223abdbb618d18a6f3b4a882d3b15efa04e7e487c27d669f388

  • SSDEEP

    3072:YN9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:29Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2060-54-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections