General

  • Target

    3032-83-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    76e9efd5b34c19a2704bf87881bb88b4

  • SHA1

    7895836de7b259406a5808f4a49f65acc4e50f9c

  • SHA256

    44d383b6d5610cab754fc2928ff669447928cbacfc7e4ae05601976d3a83b24f

  • SHA512

    9e3531e7beb554b4e8e417c9f9da9ae404c652786495ba0783794df76d75cffd32a6ae9050c05951cba4a2e2def434d2139824e826b9eacf324e219b522e0df8

  • SSDEEP

    3072:nN9zgaHeuGhriktrBxN3kuZ+zdzK8e8hj:N9Ie4rhTodzK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3032-83-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows x86


    Headers

    Sections