General

  • Target

    4120-162-0x0000000000620000-0x0000000000650000-memory.dmp

  • Size

    192KB

  • MD5

    43e712bbbd75fe7307c3aa60b0771ae3

  • SHA1

    628bfd891ccafa0020892735a73e6c48f5e5494b

  • SHA256

    6191a2bc7defa8ef883c018a14c8d5f7d19ead98ae527e4d104bd50bae375dd9

  • SHA512

    8106b2643b34d9751098b9c7c2d3a1611356c39dbf16916586272541cb367486dbf27c38939243f43efb386d126fa40ef53f5907bb5829e5c9664f79fff672f3

  • SSDEEP

    3072:eN9zgaHeuGhriktrBxN3kuZ+zdzv8e8hj:U9Ie4rhTodzv

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4120-162-0x0000000000620000-0x0000000000650000-memory.dmp
    .exe windows x86


    Headers

    Sections