General

  • Target

    4952-277-0x0000000000510000-0x0000000000540000-memory.dmp

  • Size

    192KB

  • MD5

    774adccc702c1581600ddc5b00e92a79

  • SHA1

    79859a6cf9996c4120dd825665c4ac205a4f21f9

  • SHA256

    ef84453eb988759164cccdca22cf7d2ad048dee7a6e64daa34e83bda197baa9c

  • SHA512

    b793354169d7ffbbfadaf922abd5e11ecc18e9cab2caacd2aef13d6fe0eb3bee492328a4e87cac78de6c8e6ac242a7bafdce5c14e08b715b1e2a9b7b5d929a8b

  • SSDEEP

    3072:lN9zgaHeuGhriktrBxN3kuZ+zdzi8e8hj:L9Ie4rhTodzi

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4952-277-0x0000000000510000-0x0000000000540000-memory.dmp
    .exe windows x86


    Headers

    Sections