General

  • Target

    2096-122-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    eead3dc12a61d13226d1b22f33969c48

  • SHA1

    d21cf56bc04db7dc79447f3c92a1781596ca3091

  • SHA256

    b6bcbfa86c63ae2f96f120d451860f90cf67e2702d63a75e4a9ae257b3289298

  • SHA512

    c09cc6e7880a263106df93d45e9a663b27c9b96e387d092fdaae5f01988d13c23592abe76ea5b5f8c6e8d31a13e6963a562841602f8c28b78f0e3aa99463c5f1

  • SSDEEP

    3072:fO64zyFlJDGx0HqSYxNXUfMim4G388e8hE:Hf1s0HZ8em4G38

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2096-122-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows x86


    Headers

    Sections