General

  • Target

    1740-83-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    089ed00ec55e4367cc5226590b11c6ee

  • SHA1

    158e02922d8b2cc47ec1a6b7cd30c5363554e82b

  • SHA256

    6c8d2d3d43c2e2e69546aa2dc592805cd53c7c96a034c3ae3960ae63fa618e49

  • SHA512

    6129f1ef6bd76a6c652baa147aca0ee1297219699b940da30b36da118433b9342c38a9c2895e7df252fa56d1ac5a3018a46656b18a02cd40416e5f0b568613ba

  • SSDEEP

    3072:iN9zgaHeuGhriktrBxN3kuZ+zdzN8e8hj:Y9Ie4rhTodzN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1740-83-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows x86


    Headers

    Sections