General

  • Target

    4632-254-0x0000000000510000-0x0000000000540000-memory.dmp

  • Size

    192KB

  • MD5

    02ee7ff551f59479a8cc49f62ef37f03

  • SHA1

    e930c01db4c2fc3daaaf04cab61797a8aab21404

  • SHA256

    07a12d91f90be2351bb698cfa8505b15f9be62f8a5d32c6a36cf835522d74c6d

  • SHA512

    20808ea2beac250ba85dea249f7d26d097165e70956f13afc853635e4b5cc701ab395a018c0ecb153b5ac8da61d0fd0338d28c30644031d3a4f7716e42cb15ee

  • SSDEEP

    3072:xN9zgaHeuGhriktrBxN3kuZ+zdzi8e8hj:X9Ie4rhTodzi

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4632-254-0x0000000000510000-0x0000000000540000-memory.dmp
    .exe windows x86


    Headers

    Sections