General

  • Target

    2904-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    cd023d79ba38e6bc5560402a5a68cf53

  • SHA1

    2a6a796bee133ff4afea4572862f5ffe9797cb40

  • SHA256

    247c92cb2fb854ab288250bd73ca26e997af7c1b94964d5b1b41c04cb3fda2bf

  • SHA512

    b8edda69e1593c2af0190014e31ced208712bf4c4e439183dd4f33046412061ed6db5d3dce7a84869c81afc91cb2f80d6eda30ca24d4a32375aceabf2b6dd2a6

  • SSDEEP

    3072:sN9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:q9Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2904-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections