General

  • Target

    3088-155-0x00000000006E0000-0x0000000000710000-memory.dmp

  • Size

    192KB

  • MD5

    9534d5d8d54f74b4cfae67cd8a3cec23

  • SHA1

    bca8ca10113edace5d9daeb6fd2744aba8b7a7ca

  • SHA256

    f0f9d8199ff193cc279b7a9f90b9c9c470c80d57be4aa6cd16872fcabb78ba3e

  • SHA512

    2d63f4e1490a92682c87ade4f2ddcdce296682d7b793810fa591574a464215648dafba65553451533cdbde38b44e0fda03a99b9ce9f4d22079201d9d317722b4

  • SSDEEP

    3072:8wmwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1Ju8e8h3:83zAmmI0k7vVe0E0YIM1Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3088-155-0x00000000006E0000-0x0000000000710000-memory.dmp
    .exe windows x86


    Headers

    Sections