General

  • Target

    2920-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    b1f98a030ca9609e7d07d80159e0b2d5

  • SHA1

    e836f9fda41e6b1eac4ea4b7df2cb03916bdc26d

  • SHA256

    fce866760e762d8092344a3523217e53bb3a4117c08b47282e63f42c4571ee30

  • SHA512

    1e704211d63b0bffe6ca0f02754d4cd14d426899f1c620d2dc059bdc5774bb17e33bde2f0d671c88e7cf6c715ca4b67201257d76e687dbd108c55ca8e572d308

  • SSDEEP

    3072:wN9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:e9Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2920-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections