General

  • Target

    1672-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    b3bb236d4c7984100c52f1d9830331b8

  • SHA1

    bff1a749f43f6c122a555812eebf33a9dc951233

  • SHA256

    eac474870493a578734c23a8ba135c78bfa356480dcab793d2b8146145af6536

  • SHA512

    ba0a171961a6f572434a5c1c88c96ec4691cf6e20882ba0e82f6a096e92c047dfa94ec2151ed3222b0fc903a3edfc47028f031e95b1bd3bdca3fba4d0fba498b

  • SSDEEP

    3072:3N9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:99Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1672-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections