General

  • Target

    220-280-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    b695d014bbab9b9d88d5697e917da762

  • SHA1

    0a3cb1217e281660ca897dad46846a93a22b57cb

  • SHA256

    b78a17897cc4b9575840a5d0fa99500d844ef2f84507bcadcad8720231d4f5b0

  • SHA512

    52e468e4c2669985039ee8ca75c7cb553b25bfa78e10babf71b6f2f449226e43157b8b1bfc95e37d6ebddb3d1cce7b54f15faece8998ff84c6ddb42abe94d449

  • SSDEEP

    3072:ON9zgaHeuGhriktrBxN3kuZ+zdzJ8e8hj:k9Ie4rhTodzJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 220-280-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections