General

  • Target

    2920-130-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    30f129ee562e0d1cae29a4796855a61e

  • SHA1

    5a0049460c6eafb42d07f11bb4a5456caf1d1d7a

  • SHA256

    7c076ca7ca6db04d8c2f83a728d407eaa1398997fbdf47e02341675d6255a3c8

  • SHA512

    14a6776f5f776843de9dd547fbc042f8c5c431a5872494d608b3f9741a784f194101065c10bd701c8aba48421fada3c300eb9904ca67b861b1d9b5308a2f3945

  • SSDEEP

    6144:FSsCyLa7j3Mq1tjYkswVSB1f5ayOoNrQyDnLzaQhXl0YL+MiN0D6ri8Ap//wMlN+:FqiOnC5aWvzLOSTPiA6ri8IV+ScpH5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2920-130-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows x86


    Headers

    Sections