General

  • Target

    2904-83-0x0000000000360000-0x0000000000390000-memory.dmp

  • Size

    192KB

  • MD5

    9818a2b70802c545b784d725c9171dc1

  • SHA1

    f7bf8b62f3dde1f8f0c99307930ee16074b3f5b5

  • SHA256

    90efc59378222f75944a8fd61a7acb57e94ce485dd9ac48d67d79752e0d3227e

  • SHA512

    38ee4fbd47d08035b5fe32a5b7d2c8c21ec5545f7ced49a38d0ec7764ec8006708e2bf0330a65174aaba8ad32db542054aecb05d3a7d4a45af7eb660f5203bf3

  • SSDEEP

    3072:sN9zgaHeuGhriktrBxN3kuZ+zdzD8e8hj:q9Ie4rhTodzD

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2904-83-0x0000000000360000-0x0000000000390000-memory.dmp
    .exe windows x86


    Headers

    Sections