General

  • Target

    1008-122-0x00000000002B0000-0x00000000002E0000-memory.dmp

  • Size

    192KB

  • MD5

    5e1f63d090f9e30499db8ace05e14a09

  • SHA1

    c89c22f50892dcf9e7a853623a777baa469f2ce1

  • SHA256

    923ec92f6275152ca8f98c72eac878ae4cc3871d1933ca63fc6633739f075824

  • SHA512

    5d40159339bbad705f766ed855f946b1f44339e1cce92c5b4c828e8b85d899e8b70f767ab30ce3b8b4003e95887830b704c00d291864d3cc64c59a95787c56a5

  • SSDEEP

    3072:jO64zyFlJDGx0HqSYxNXUfMim4G3K8e8hE:zf1s0HZ8em4G3K

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1008-122-0x00000000002B0000-0x00000000002E0000-memory.dmp
    .exe windows x86


    Headers

    Sections