General

  • Target

    2968-97-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    791f2848fecb8200ad3dac46effefb67

  • SHA1

    2c51b12409f9759ce764a6e72e76a40709f64c6e

  • SHA256

    ae131f5dd7c26317cb9fd18c84cbb2a5ec9fbc6451bd6efb67ce3ed6ca66cd73

  • SHA512

    7d4515aa7f5b414b212c96077805e58f5aac24c5f9f165a37a5fe653d6393e8080a6df0edcfcd5c0f7df6642cb1b0962c506a1dbdd41203596522f41d8757d9d

  • SSDEEP

    3072:dN9zgaHeuGhriktrBxN3kuZ+zdzn8e8hj:T9Ie4rhTodzn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2968-97-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows x86


    Headers

    Sections