General

  • Target

    3024-110-0x0000000001380000-0x00000000013B0000-memory.dmp

  • Size

    192KB

  • MD5

    195f842ecb9c0ca8f792472726faea2a

  • SHA1

    335d1781391071e989653e97300a642f3951e0ff

  • SHA256

    1dfdb6f5e5750b4defc7f3c155571522ab570cc20f3e32e5b8a18169d3def19c

  • SHA512

    a05c799751977965e63716391429d8b1bad6ad40faa3f7f06425d4859e8cd5af85314e3f33134b49cdc51a2b448547bd9e3cd1ef128b9fdd1e91c9bd42b57856

  • SSDEEP

    3072:PTS18qdsI0PBESjOvGew8Z88FQE02quBoeaTJa8e8hr:PTSfsI0PBESOZ88FQE0QoeaTc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

dugin

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c3e46e091100fd26a6076996d374c28

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3024-110-0x0000000001380000-0x00000000013B0000-memory.dmp
    .exe windows x86


    Headers

    Sections