General

  • Target

    3020-83-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    6e197482283d8a7af614e1f7f2c63be3

  • SHA1

    961fcd6b3b6c77f55c34beff1f552dab1c164865

  • SHA256

    9dc6a51d13340a231ba6eaaa9acc294e78ed948cb0a4b41a5a52bbd5cc074652

  • SHA512

    8a50adc8e75d5980b5b2fcd8ab3b84e9959f4671873260351e45211a56c1b87bd6c3d5438d8f2773e873df3f3b0a5b667440f94d2afb364c00ef013238637bd0

  • SSDEEP

    3072:0N9zgaHeuGhriktrBxN3kuZ+zdzu8e8hj:i9Ie4rhTodzu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3020-83-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections