General

  • Target

    1864-83-0x00000000003C0000-0x00000000003F0000-memory.dmp

  • Size

    192KB

  • MD5

    7e1837af8685e068ce3837b01d3bd3e4

  • SHA1

    cc9116a96ac6808c6c364aff085b5d7ee6088f0e

  • SHA256

    555ac8e56cfc270c2b78f2dacd1d0aa7a26c12a081dde2c2a82abc681b6e31e8

  • SHA512

    b4d59f398a4b00435a958f3f4cda61a3e84d678f2cda7f81f134925370ef7d083fcb2645639951247e230ad9ca1fcd6b20c0e504e5c9f6cad84499c764361a32

  • SSDEEP

    3072:pN9zgaHeuGhriktrBxN3kuZ+zdzx8e8hj:/9Ie4rhTodzx

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1864-83-0x00000000003C0000-0x00000000003F0000-memory.dmp
    .exe windows x86


    Headers

    Sections