General

  • Target

    2056-122-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    81c2095eb28d9fcccad9b98771ff5ad7

  • SHA1

    3e4b645cf2bdae66c0f465c949cb4d3ed6f9072d

  • SHA256

    793e39253a68ed46a7216cbfe40d0c04309365fbe1c4e565f8aaf857ce4d4a33

  • SHA512

    5ff8a2f417045c2c31b5e132dd793c0131921e31e942a029ef2496d0e478f9918f1fa4b3dd2fc8ee2c3f1c3190d17ff5302f60f664b928ddd333a629c659bdbe

  • SSDEEP

    3072:EO64zyFlJDGx0HqSYxNXUfMim4G388e8hE:wf1s0HZ8em4G38

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2056-122-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows x86


    Headers

    Sections