General

  • Target

    2156-88-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3183ad8f15cea9ed9944a4685d7a657e

  • SHA1

    cff1d2d63f3900b29b7f308f03f249214948d46b

  • SHA256

    aba36b866b94943b56bec75e9b312efae452e1f01a2e989d357c4b8f677c9830

  • SHA512

    090dcd178827a806e8e9b4c1beda6d69d0e7ad4fdfe98e27d42b0323f2ee0e685be5dfff6bf7a50986a3b4660a862092c4730aa946aee79ba8268c7fe43aca13

  • SSDEEP

    3072:oGpozbN3jZgNmGDuizxN1UqmHhyTW1rYv8e8h0:POWNZ5UhyTW1rYv

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

140723_11_RED

C2

85.209.3.7:11615

Attributes
  • auth_value

    3f34a491203d0fbe384ab2b527118c80

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2156-88-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections