General

  • Target

    3012-83-0x0000000000300000-0x0000000000330000-memory.dmp

  • Size

    192KB

  • MD5

    dd245025f943db43a131e55b3aa0638a

  • SHA1

    052b363387635ae28af504aa1f1038bf68668717

  • SHA256

    2da1857096f8509d7b4e43c46844926f7013fc5b2f29c9a7064b193ce85daaa0

  • SHA512

    b25e220dc8572d24f6a2ca0f5ef13a03815026fee68010f62f1ae862d9d175b6a5531acd3178e0e0f5afe6341b65c0a399dea51b9295cb606b03504a2cc9cd8b

  • SSDEEP

    3072:hN9zgaHeuGhriktrBxN3kuZ+zdzl8e8hj:n9Ie4rhTodzl

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3012-83-0x0000000000300000-0x0000000000330000-memory.dmp
    .exe windows x86


    Headers

    Sections