General

  • Target

    1204-83-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    9222417ab0d446242a2a10a2fc960ef9

  • SHA1

    f8affc80347b71fd90e0836b0d8f2c5877a5cfca

  • SHA256

    535e79e359cfb21b92013e5eae896f50ece8631548831e2eaf70a772e013f135

  • SHA512

    86ce10684b0475218955716af136d2aeb75f29260c46e0a1c21732b575904f774dd489f7c77e72fdf944ad7edd40168d83c49b02a38d5b6ac8d79e13d48ff4ec

  • SSDEEP

    3072:eN9zgaHeuGhriktrBxN3kuZ+zdzq8e8hj:U9Ie4rhTodzq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1204-83-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows x86


    Headers

    Sections