General

  • Target

    904-83-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    cab87d59be0c6d0181330975eb55c37c

  • SHA1

    e50f090f1dfb7befc941b9c356639881adb8b0bb

  • SHA256

    04e17ec659841c7897d7747283aff9d905157e8d575049ea05e3a95f6236c933

  • SHA512

    f093e6d286f6023ed4eb8b181825792f76bbab6cc00c7a6ed95560661d72c3f9d250b7fe63ef597065667c722384f2cd99c6ce323ce264de44898c31634f335e

  • SSDEEP

    3072:XN9zgaHeuGhriktrBxN3kuZ+zdzm8e8hj:d9Ie4rhTodzm

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 904-83-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows x86


    Headers

    Sections