General

  • Target

    5084-159-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    6fca72329bed64d54c2108361420404d

  • SHA1

    0b32e3bfadcf6ea7aa3a1c1f105f9ed019c71939

  • SHA256

    3033cecc5fe6833a9cd5f313dda1d38698b18e253702c7edeadfcd14d2a27f4a

  • SHA512

    3fbf1d938b86a3f21af699020f9e871a13aca05d31bcfac61919eb1f7726c05a8e84ad3580c03b687d907ea7e79d586d259f7440b286da2e3d1dd76554417bd0

  • SSDEEP

    1536:tv5+CKYhO36sv0W7TbkrjJrHZPmksp03M7ws9xNJNYQHnbutF9HUAdk0GkRs8e8m:pTFhIArHP+ppV9xNEio9H7dkP8e8hY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

170723_rc_11

C2

rcam17.tuktuk.ug:11290

Attributes
  • auth_value

    ddbd29a91f6321652fef2b14e5ac70d5

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5084-159-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections