General

  • Target

    1456-83-0x00000000004C0000-0x00000000004F0000-memory.dmp

  • Size

    192KB

  • MD5

    749c4bb4cc8afa8d3df41bfaf022dbec

  • SHA1

    72f30fc51ce2d194643bdefb66d71df739062271

  • SHA256

    6dc39ef62c0da42e11b1a057fd9f39294f13d40e472770ddb4f9226c01e21739

  • SHA512

    3896044d2c74c347af3dbdd363c678872fb684fb038131a5d5041cd5607a62a8e202f48eebb4ee180243ad313ee8ac0b92fc38dd382d77b0a4e967aadb2b4595

  • SSDEEP

    3072:mN9zgaHeuGhriktrBxN3kuZ+zdzh8e8hj:M9Ie4rhTodzh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1456-83-0x00000000004C0000-0x00000000004F0000-memory.dmp
    .exe windows x86


    Headers

    Sections