General

  • Target

    592-132-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    d8cbee6c6d6051bb5f4e1206a761cc38

  • SHA1

    595f08216b6e4bbc376986b9aa88728f3dbf3a98

  • SHA256

    6d0c6ccddc4805e7e5dfc1f9a3d6b77525c0fefcd7520e38e6d79c7d1cf5a0fc

  • SHA512

    d4a5f534fcc920c75a57b34947898b6bbe97627be9e4edc2c49c106cde066db456c83f7cfee57b06e043132469700da040cfd6f6e29c0bc13a5b52273077e6ac

  • SSDEEP

    12288:8oeryu2fBpekAVvSoo4r4Mg2ESMQ02WE346o7dL:8Hyu22NVvK4r4MBEt2tIPdL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 592-132-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows x86


    Headers

    Sections