General

  • Target

    636-54-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    632f3a035e755b4452bfdd3c895d8508

  • SHA1

    98a7c8c5cf1d8026d3646c8afb655c0343c63136

  • SHA256

    1d7482f98254e871c864eb5f01453cc03eb83742ae3636717a2a47dddde3a325

  • SHA512

    6445a356a5ba0b3edc26793b56a132557704010de75069c8eb06106e7e23d4a21c7a10879b5f8cf88176bdf44e2badff8cc54a2e6bc2a3fe9bb676c122be6bb9

  • SSDEEP

    1536:FbuR0C10WqlVZRGWyuHrTog/XzMXMQ8ys88888888888888888888888g888888P:cR0feoog/ZpyqVEUCidWT8F18e8hQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 636-54-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections