General

  • Target

    2972-83-0x0000000000350000-0x0000000000380000-memory.dmp

  • Size

    192KB

  • MD5

    a58d82d92fd60b8b9e70d4108d42cea9

  • SHA1

    49eeeaf9c3df7b64819b42cfd96dd323ad70432a

  • SHA256

    4a5ac04e2b2c40cb9f9be27c82e49e5f5e8f21018562b945fd3ddc4629def34a

  • SHA512

    4172b94af7e43818de9b5ec800e9d47eafdb3a7ad96c3ef3bd8179771b9fe593d5425921178a29ab13d79b212fadd641661c8ecb57127987710d0140eef1868c

  • SSDEEP

    3072:cN9zgaHeuGhriktrBxN3kuZ+zdzW8e8hj:69Ie4rhTodzW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2972-83-0x0000000000350000-0x0000000000380000-memory.dmp
    .exe windows x86


    Headers

    Sections