General

  • Target

    1656-54-0x0000000000450000-0x0000000000480000-memory.dmp

  • Size

    192KB

  • MD5

    c56a2d8789eb9f75b0800a2aa2101192

  • SHA1

    8198d6d9177e8840f81689cccc441c28d3af6259

  • SHA256

    1b9ab8c00f55c459053d4a28edce1a700be93be44a0ce097d2317cb328d06e1e

  • SHA512

    91ec6c697181b3bd1cc45e96dfc919b2ff4fc13e7a7f185bd4b866c50e86815c04efeda82b29936cec8608b485a3d2e38ad4cf44d403b6be2614b368f298aa50

  • SSDEEP

    3072:TN9zgaHeuGhriktrBxN3kuZ+zdzG8e8hj:p9Ie4rhTodzG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1656-54-0x0000000000450000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections