General

  • Target

    3012-83-0x0000000000370000-0x00000000003A0000-memory.dmp

  • Size

    192KB

  • MD5

    42eecb77865ee7878f4d27b429b7b403

  • SHA1

    1b428ca9cbd2ee206d15921b9586b77623908854

  • SHA256

    4cb54a29a33b39eecabf496b040c005aa92d73cd057507802a6fa37857f7288c

  • SHA512

    6172046bc8186b0e13060879876806af29cb00e30db2a47b14398730c35e178e9b22bd34e4aff0273157d4e1b2531df459c3c54feb8346e04057ba8064fa7d1f

  • SSDEEP

    3072:hN9zgaHeuGhriktrBxN3kuZ+zdz48e8hj:n9Ie4rhTodz4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3012-83-0x0000000000370000-0x00000000003A0000-memory.dmp
    .exe windows x86


    Headers

    Sections