General

  • Target

    1520-132-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    ba512c077e5f45cd646d4b91a5447950

  • SHA1

    e130dd8ddd27f3a83e10ed764da2490e03627730

  • SHA256

    83d1b3f3cbc9205e9f1ffab13f8b14694182e9d14445859e85252d29bd6293db

  • SHA512

    6ac33db6a03adb470d383576a5f2c09ac1e967ebfa243e67aae3122bfd3b4c7496b611624dc8b9b8a3b694327c330bd2337516e1b92174ef404dd63ae199c651

  • SSDEEP

    12288:x1AChi4eQnbBGyjZKfFNx60oxvhpKQoaYYtdp/0jKlGgB+q:x157tGAMNNxqfpKQoaYYfv1+q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1520-132-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows x86


    Headers

    Sections