General

  • Target

    1456-122-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    d26f4f8e3ad4dd0d680227b1c850709f

  • SHA1

    1221b983b8fa5e41d69952dfd65de4dfaeb55777

  • SHA256

    5c4c6073330b40ade91758f15b020e56f98351878e47ce2a9e15d5565b9bf3c7

  • SHA512

    06e9160a80caa5c99f1586f34b38d4341a66f93f23c32f524b5f42f0b8988ab7a24ad8ba1787f5f84f4e7404123abe437544a2351ee4b7785728e84628f4bc5b

  • SSDEEP

    3072:cO64zyFlJDGx0HqSYxNXUfMim4G3g8e8hE:4f1s0HZ8em4G3g

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1456-122-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections