General

  • Target

    2816-83-0x0000000000340000-0x0000000000370000-memory.dmp

  • Size

    192KB

  • MD5

    0eb94b829c57ce3a7bf4f89720a254a2

  • SHA1

    c647f6bdb3b88bee922889baed2c0a1143f06609

  • SHA256

    cad2fa3f7b07a25b4a60c911c42e063085fd76df181f0083785daba0e2ef8135

  • SHA512

    a4c9da0f30df0ba4df22a5d082721d8bd0cc86e8a2a4d26aea654eeb4a139ea5e8b5c95e62d952429786c9a830e4a24272e79a2f0694ba35af818103fc08d40a

  • SSDEEP

    3072:lN9zgaHeuGhriktrBxN3kuZ+zdzZ8e8hj:L9Ie4rhTodzZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2816-83-0x0000000000340000-0x0000000000370000-memory.dmp
    .exe windows x86


    Headers

    Sections