General

  • Target

    1688-62-0x0000000000A30000-0x0000000000A60000-memory.dmp

  • Size

    192KB

  • MD5

    aaf971c9ac99a442c62fa572dae0aab8

  • SHA1

    3636ec40e824307a97be59799a34ac8251eaba50

  • SHA256

    d0ded04d08c1b52bf3fce2641575d795286f65c9472d03e3805f3f65b9caa542

  • SHA512

    419c4608a67dccf03a079baa205bb8fcb92daf9001dc7a2af0503abab0086722c3a8efd20bfa6e49213191e375247840326f82eafc27d836a81b10c4db888119

  • SSDEEP

    3072:O+fDbCPvc9r+ghxNzIoIH50m7Qh0Q8e8hC:OhBgxSfQh0Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

x-101zz

C2

94.131.112.27:80

Attributes
  • auth_value

    55d38112b069e981e131a99cb4689f21

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-62-0x0000000000A30000-0x0000000000A60000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections