General

  • Target

    2768-131-0x0000000000330000-0x00000000003BC000-memory.dmp

  • Size

    560KB

  • MD5

    2fb3c56d792bcfe905b07d684f1ca59f

  • SHA1

    5e1eb029e726646d08d2066c48a3454cb528bacb

  • SHA256

    ad86c4b529c5204b8919a89f0f0903ec7ffb301757b729e1dc330afdce421c9a

  • SHA512

    7d878cc8348b116d91304af437e565d3c41ae2fa5b5a6a3077963bbcb77f38d46cb2dfdaac4a0deb7af6382b6580ecb3a09cd85e69045a2d98fa23b08c13aa98

  • SSDEEP

    6144:O/PzSauAO+k4NMbynTJbR+GH5tDAcTu4aL/qUn0rZZ0Orn4rYyGu8yfz0gv4sO:O/bD7OF42yzt5RJTEn0rlDy5fogQsO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2768-131-0x0000000000330000-0x00000000003BC000-memory.dmp
    .exe windows x86


    Headers

    Sections