General

  • Target

    3048-83-0x00000000008E0000-0x0000000000910000-memory.dmp

  • Size

    192KB

  • MD5

    fee534201e2abc5c0037961e2662084b

  • SHA1

    fe27b109b3e8cfca3f840b68d4027337183f8228

  • SHA256

    1c6383722d21a58476c2bab6a4839d3745cddfb46e15d4dad2b608e7c92143bc

  • SHA512

    137758d6c5eac830259fbe038333c5c42ef77ef5c7e8793de5d5d6e4535fb0982304c4931a89e6892455588757f8a1e7e78ac8f4dcca304ed332a3fc40a63385

  • SSDEEP

    3072:CN9zgaHeuGhriktrBxN3kuZ+zdzL8e8hj:49Ie4rhTodzL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3048-83-0x00000000008E0000-0x0000000000910000-memory.dmp
    .exe windows x86


    Headers

    Sections