General

  • Target

    3060-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    777c03d736bb2f1e199aec41d097fb50

  • SHA1

    ceaf53c5a470f42b702ed503c80abea319932102

  • SHA256

    cc410202e9da1f27cf1475401b6fecb23bdb1176dc0f43dfafc30ad1a6731a1b

  • SHA512

    16a1462392604cb0f2e4adbbe15439227d0f45264261da063fa5f71be0ebeb9ac388d45a38117ef12fbce235c0c0a1fbdff05d96dc6925d726253b667a9642b7

  • SSDEEP

    3072:ON9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:k9Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3060-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections