General

  • Target

    4864-134-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d77ec3851936a64860cb9fbc89df08b6

  • SHA1

    a057133b65f1189f798c9f4c565ed1a70480645d

  • SHA256

    1528bed210724415da0daf09dc7a8dd75848975723ef63069c95d3d6c0bd4514

  • SHA512

    9a9c581e34b30f9cc4b57aa976330ff3064009fd4113d00fee6ad7de930684fddf6d51b2d19dfd412523e0147391033b7f3d00293b1d2f2efda89006a3e3502d

  • SSDEEP

    3072:qcLaERqzOK5NIITxN6K5D5kXkcP88e8h8:jacK5WIO0kXkcP8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

inst

C2

135.181.205.149:7724

Attributes
  • auth_value

    e4cc3acd78331714a123858fe2b1c234

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4864-134-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections