General

  • Target

    4588-155-0x00000000001D0000-0x0000000000200000-memory.dmp

  • Size

    192KB

  • MD5

    6f27e2bf966998a4daf48f9101f45a35

  • SHA1

    ebf04f34d1807b8d180d66c1969669d68d943ed1

  • SHA256

    c3a3292695f9c6567df851573c4f759c04609f39c2492852a6994bd00ae1e05b

  • SHA512

    5f578180bbb3705a782249355160dd86501a2f1120b6dff06a9cd8f5376798e22614ec1d15fe705931a958b58206d1c574549c9e9d342973e7a3bd01be0980e4

  • SSDEEP

    3072:8wowJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1JL8e8h3:89zAmmI0k7vVe0E0YIM1R

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4588-155-0x00000000001D0000-0x0000000000200000-memory.dmp
    .exe windows x86


    Headers

    Sections