General

  • Target

    2028-83-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    dc6bee4dff01417bbcf63c7c33683133

  • SHA1

    3bae806489d6959e5e174119dc7d1b780107a023

  • SHA256

    35bc806d776f383d0909e60af9aae6cead77741177d174eced9301a540156f1c

  • SHA512

    22cebb0b5a08be288bbd37a2c5c1162b8876fea060edfbb9281ad15f06d9ec84e81b42dae882fc17c2f1b802fc68487cae36af23d94972d97c6d5807fab76984

  • SSDEEP

    3072:JN9zgaHeuGhriktrBxN3kuZ+zdzn8e8hj:f9Ie4rhTodzn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-83-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows x86


    Headers

    Sections