General

  • Target

    2968-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    b7564b90aee33d8993f19b5922cf5b26

  • SHA1

    ee63c36531ef024097601af38aa7bac57b757c40

  • SHA256

    ca9161ef192a9d76c89cb2b59864b1abdf0f0cc64ecca05daebb4d1f35cae5bb

  • SHA512

    01550b1b9efd4054c4705b897be2d36cd4ba87bc42cef1ad204f4c8b3eef1e3def1cbeb9afda03cf0826f9ba14b63047bd26cf072a461e3d9a46988ae31dff5d

  • SSDEEP

    3072:EN9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:S9Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2968-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections