General

  • Target

    1600-54-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    4f50100b91dab829dc10139198ec27b0

  • SHA1

    b393462228cc744427a9fa29481e57795af54271

  • SHA256

    d52d3e285ce8e38705f766f18f8c0307dfcb64d31c58af4fff4d70fe124f12a0

  • SHA512

    7c6fea282e822c743cb052dfeb563253ba5b364735ccedd15879f2bf3103c5aa44538a2d303863c4a9d1bb095d550ad55a5cca89b690d10d0513a7e1c70e8429

  • SSDEEP

    1536:5buR0C10WqlVZRGWyuHrTog/XzMXMQ8ys88888888888888888888888g888888x:wR0feoog/ZpyqVEUCidWT8Fv8e8hQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-54-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows x86


    Headers

    Sections