General

  • Target

    1672-122-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    5bd86af486cdbe75371cedd48961c4e4

  • SHA1

    a5bee463b8677670d8a760a045dd5c40a2c5cfc1

  • SHA256

    19002af997966aa3b29ef00800fb4aeea71a806468ffdadf32dbbccfa9de0c60

  • SHA512

    778868c7978a813e578ff397cb130a4c5248829b485f73929db39a9399573da58d833b82c91d6cb356f6e28e562b302a2093c81a8920d1c8b6772c06ff4577ae

  • SSDEEP

    3072:OO64zyFlJDGx0HqSYxNXUfMim4G3p8e8hE:if1s0HZ8em4G3p

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1672-122-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows x86


    Headers

    Sections