General

  • Target

    1960-83-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    853744a3397138e02b761b2bd66dbabc

  • SHA1

    24c114013a7cbea0c72d86f319ea1e5a05b6634f

  • SHA256

    46a3147b1f9b8c1b0f47a19cf2776aa3346f73e6c381a30dc11444bce1e231d3

  • SHA512

    39bde0d71699c0ee23ef9f6dac82a52656505ceec61219f6d6524e2a178b1e349662cc538a999eaab652cdb0fc5bdcfa2e4592739f3feca3dba2fff4ad5371b3

  • SSDEEP

    3072:eN9zgaHeuGhriktrBxN3kuZ+zdzK8e8hj:U9Ie4rhTodzK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1960-83-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows x86


    Headers

    Sections