General

  • Target

    3012-55-0x0000000000090000-0x00000000000B6000-memory.dmp

  • Size

    152KB

  • MD5

    b9d2751af73f532b3894e090fdddc34f

  • SHA1

    5f72caf9b6bc571698b8ca380a62ce02be7207f7

  • SHA256

    72b947b99899476bf2856461157a7f81d965667ff86f5968428f23ba896dc43f

  • SHA512

    d4574ef1362e8eceeb8c47dd669ad75ac4a6333069e7486a6926fda74d8b833e4c93454bf4a7ef07fcd067615ed964ec294aabc76817d2276bb85f7be9338112

  • SSDEEP

    1536:HaCGcnVHT1u/o3Q5O6+f7NWy9Fu/OYmtZhZja9bV7e/8H72NsYgibfbFDKsRq:6NcZZgKjNWgurm90NU0HBYgafJlq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM LOGS

C2

176.123.9.85:16482

Attributes
  • auth_value

    63cc484234216dace4114bc03617721b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3012-55-0x0000000000090000-0x00000000000B6000-memory.dmp
    .exe windows x86


    Headers

    Sections