General

  • Target

    2096-83-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    b2d933ab679c0efe80aa19e04d618cbe

  • SHA1

    99b3a51f3f89118d1eec689180f4dfd995e127a5

  • SHA256

    112064aa5c2476bfa3c378fad58990f2e4567ccdc207ff0963959f6fbce491aa

  • SHA512

    7fa11ff4a41c0410a7e418a4a0a0942224cf848380540057efc8d9e882aa22e1212caac687fa16cdb75cf557ba3a206e908ec7bfc13928d6f54fc429175f72b9

  • SSDEEP

    3072:/N9zgaHeuGhriktrBxN3kuZ+zdzN8e8hj:19Ie4rhTodzN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2096-83-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows x86


    Headers

    Sections