General

  • Target

    1492-122-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    74e66ffe5b84d826d3f17c568dff7ad2

  • SHA1

    aad0e34050cfc1cc27e302cd3705414230826144

  • SHA256

    f7c3a6c4818cdc77e227020b0da5530608fc44bb1e5e6c527447429c16c1c622

  • SHA512

    a1ddc66661b71f1708e9b02b2c5e262a222f84305c0116b88f2e12fd4ae7765cbbe743eefe8eae0f31338c700028fbb1fcd007c6b39c2251473c8cbce792dd06

  • SSDEEP

    3072:sO64zyFlJDGx0HqSYxNXUfMim4G3g8e8hE:of1s0HZ8em4G3g

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1492-122-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections