General

  • Target

    3068-83-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    e4ffec5ceda412eda364450416013e0c

  • SHA1

    7c1cb36a4a25247107aff520ba7457434f45c1ce

  • SHA256

    7c727d401a9aad80b45b3a9666ce00f009d0c7140412b3e2dd5c4ebcaf8223cb

  • SHA512

    045e130b264c08fad808a1eaf0ee81790a87fcedbe580a9d0b7d8ba2d59babbac3a0b2923c8a19ac98bad377ba1f92383e5c78b544ed3d3700b22ec94f4e4876

  • SSDEEP

    3072:1N9zgaHeuGhriktrBxN3kuZ+zdzu8e8hj:79Ie4rhTodzu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-83-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections