General

  • Target

    4216-301-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    4eabb9fd203dbcc16877e8f6f068c8a4

  • SHA1

    e95c68ca7c1a98c71e033f227a24138b53129e04

  • SHA256

    5aa42947e2c1cff78075392b55546837bf276b978309cbfbe6fe0010a3dfc2f2

  • SHA512

    cc4c0e7b742e9c99be3b7328cffa0893e3e7261fc9a5b582425bcf2abf6a63d4966dd4ebb2677d8053541216dcbe3beba586b3429c107dbcbcef4b77175ed24c

  • SSDEEP

    3072:pN9zgaHeuGhriktrBxN3kuZ+zdzJ8e8hj:/9Ie4rhTodzJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4216-301-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections