General

  • Target

    2992-97-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    30d7c3b2619ae1862f26fd904a7d248f

  • SHA1

    2007c0d134648a9a7bee0a50807d27d8ee4e6f1d

  • SHA256

    50e03fa4e8e6f13b63eb0fed1a68ceba9170d8e947f789be2f0f0115c0c8b292

  • SHA512

    a70e56506db77f938e879fc2ee39cd58010c5ac639f51fba784d3e6070c3cb5dcfb8246e70a37e4286b9ef97c0f993ad2c628ade1af967317b4bd768a262ff13

  • SSDEEP

    3072:uN9zgaHeuGhriktrBxN3kuZ+zdzJ8e8hj:E9Ie4rhTodzJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2992-97-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections