General

  • Target

    3032-83-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    656b999d667f0ba3ac831932a7690eaf

  • SHA1

    79784cb89589882b4da2c90bf3cbad62d453d09b

  • SHA256

    7c47d218153130dee2ec5f1af226e62f9db1a5e9e7f78f7934bb5248353448f7

  • SHA512

    6621673f066e82b66c69d4a4d612556442e2bea4f587bb1974fb97bd6c70856da825789a4041e19f9bba0d6fe5056e5d07b6203f54b716a25c21f8776bbb8be6

  • SSDEEP

    3072:nN9zgaHeuGhriktrBxN3kuZ+zdzk8e8hj:N9Ie4rhTodzk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3032-83-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows x86


    Headers

    Sections