General

  • Target

    2948-89-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    04523456f2766e73a1aee113352e9d64

  • SHA1

    49c4c75d03789ab4f50588f265236fcd428ca646

  • SHA256

    f3654626f8d7aad218208a69b08d5fcdda6a42b1e8beb24d4ce743c5805ce43c

  • SHA512

    cd136e3d4b7e49e377f4f38cf82f226b0d7b2d138f945759890a746d271ba75a65745536bfb6945ccb84f718f186fa3f5e6a3cb4aa1d0bfca6068c901e2f1762

  • SSDEEP

    1536:LpUOCP36sv0W7T63lFx9rHKwffQKshh1hhhXlduWxNntYQf9buiB9h4ANsD0GkR:LpUr92iwnSuWxN2gh/4ANsD

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

090723_rc_11

C2

rcam.tuktuk.ug:11290

Attributes
  • auth_value

    abd581cdd66d51ad306682319cafa5a0

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2948-89-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections