General

  • Target

    1672-83-0x0000000000650000-0x0000000000680000-memory.dmp

  • Size

    192KB

  • MD5

    850a9b73a405ce75aa831ca248f80e4c

  • SHA1

    443c2352f00415960c19db0e26dff3714df17c9c

  • SHA256

    84d5034d4314ce4cdfabc5297436c0fe3e061f643610637cc3a727c4b28bb21b

  • SHA512

    8519ec01fd835c4b4662c07ea8df9bf251ff717eab2cd1fe1d95a9e44e80b335ef9d192b8687ea2b68bb7bcb06f57958b8e3c7b94c0753158fc8c6f65c895c64

  • SSDEEP

    3072:3N9zgaHeuGhriktrBxN3kuZ+zdzm8e8hj:99Ie4rhTodzm

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1672-83-0x0000000000650000-0x0000000000680000-memory.dmp
    .exe windows x86


    Headers

    Sections