General

  • Target

    992-83-0x00000000002B0000-0x00000000002E0000-memory.dmp

  • Size

    192KB

  • MD5

    a3c39097c3efe80e58ae554f42cbb3e0

  • SHA1

    8507b62038aae85153627ab8be5f2425ae0de020

  • SHA256

    db24ec7e0b8d9ac113c38f9fd72937d55b8ced1339dd825cd7ec702c1ab66b5f

  • SHA512

    57da15465ba7834f0ca3dfc205a0d3b3f382e5fc300c0727b018edd42d235f71f74b1ab2cea4836767f2c3bf010f010b40dc03a7d4ec8f0a44ba567ad11235f5

  • SSDEEP

    3072:hN9zgaHeuGhriktrBxN3kuZ+zdzM8e8hj:n9Ie4rhTodzM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 992-83-0x00000000002B0000-0x00000000002E0000-memory.dmp
    .exe windows x86


    Headers

    Sections