General

  • Target

    32-155-0x0000000002080000-0x00000000020B0000-memory.dmp

  • Size

    192KB

  • MD5

    981affab5da054693e339561f0cffa53

  • SHA1

    967cb2c78173bf89f421b9cf8befd6dcd641b88c

  • SHA256

    ec4aeafd36c066128624540739db130fe729161bb113bfbe00414ca7e7dd3b05

  • SHA512

    16c26235a7f8782944bb439eeb7548fb6ec582d8f03c50ee5cb04d4f54e60ef39a982c248c9fe6dec1d42598b3b9d7f19df5853bae5b1f24d1215c53a699e55a

  • SSDEEP

    3072:8wpwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1JC8e8h3:8szAmmI0k7vVe0E0YIM1E

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 32-155-0x0000000002080000-0x00000000020B0000-memory.dmp
    .exe windows x86


    Headers

    Sections