General

  • Target

    1008-83-0x0000000000300000-0x0000000000330000-memory.dmp

  • Size

    192KB

  • MD5

    efb244db847bc631cbe8374156f7ac44

  • SHA1

    561b1d438bd05c2aa24d76695521372bd0a7d0f6

  • SHA256

    7a194b2a62a5a93a8907875bc486b6ba709bbb67623e35c7d0d4977fa5223f98

  • SHA512

    48f5a1b178f2942cceed75b84cda702c43f503bbd83847605e8c56120c434e5a098efd600e1db81a367f3955fa56b6d1cba0ceab261e107efe1230eb20777125

  • SSDEEP

    3072:CN9zgaHeuGhriktrBxN3kuZ+zdzl8e8hj:49Ie4rhTodzl

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1008-83-0x0000000000300000-0x0000000000330000-memory.dmp
    .exe windows x86


    Headers

    Sections