General

  • Target

    1308-83-0x0000000000360000-0x0000000000390000-memory.dmp

  • Size

    192KB

  • MD5

    8342bb3262bb04392851509d607ce9a5

  • SHA1

    0e2ca1e09d0c91f9fa1e5e7f96a425d8b74a03f7

  • SHA256

    4dc1eed2ba5181b3a3c858b65e5bbbe960447d488a213c93a0d6753dadc7fec0

  • SHA512

    c99197c89d10e9bb4eee40b8a5c1c5361b09430d72b435b21ef055d1f4b99b6b9cef8afd517e657040e6d6107a8f7521aa5a617483f6c7c51923272608505f03

  • SSDEEP

    3072:4N9zgaHeuGhriktrBxN3kuZ+zdzD8e8hj:W9Ie4rhTodzD

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1308-83-0x0000000000360000-0x0000000000390000-memory.dmp
    .exe windows x86


    Headers

    Sections