General

  • Target

    1092-56-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    637e6fc744c57e3e29133b97cd121a87

  • SHA1

    972cd4b2382350ee2a612892c5b2202e04232b0e

  • SHA256

    5165b214ceab40fde4daa6d8af60469611765fd50694ce60556013393324321f

  • SHA512

    eae764f3ec0fe4b133ca81a55923cfb6c3420d74a7140445e34c51b0db13fbdc435396f68a45c7c631927509efc702cc4c9179ee770722c81156f5f8984ddac9

  • SSDEEP

    3072:qkfpy80nI05x8tMOyc0WZqmmE0SbY7d1J18e8hL:qkfmnI05x8tPqmmE07d1T

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

TEST

C2

46.149.77.25:8599

Attributes
  • auth_value

    8bc44a2d180183251d176d7b20ad1f91

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1092-56-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections