General

  • Target

    1828-57-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3cc623e9a5569e7cb0768451f2bef941

  • SHA1

    895d3463449d33394a76fea8d8aa693f35bb64c8

  • SHA256

    329bbbb6a02de5c067d38f005ff99d16e93405991fdaceb0d4725236ae8e457f

  • SHA512

    34bd10b85e6c733137354c90f457fe35ce67e35c0948e5c92a9b423b6f8bcdbc9764da49595298396acad984f78a76f311bb0b2b46cc3814bdb3e8c1314f7f17

  • SSDEEP

    3072:pkh2yqg5JI0SE9BbOXtgwXRPulE0qd3nJNgJ88e8hM:pkh2YJI0SE9BplE0g5Ng6

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trafico

C2

176.123.9.142:14845

Attributes
  • auth_value

    ae8f72bc34fc0c248b3abb9f51375751

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1828-57-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections