General

  • Target

    2552-56-0x0000000000090000-0x00000000000C0000-memory.dmp

  • Size

    192KB

  • MD5

    8fb4db42b5c774868d821261ce3328cf

  • SHA1

    b23fc7c8bc808ef6c82094f24f1776ccbc269253

  • SHA256

    9ca25ba38f6360804839f24f834093ffcd2785d3ca04a3c4756ac702fb0d700e

  • SHA512

    78eec4351ce91ce0cdbfd19654e829ea47f127147a8e0ddd3a07dcea75d160908b2e5e24b93a62fe449b3cba009459da346c916b05308067c1b5578298a1270f

  • SSDEEP

    3072:Tkfpy80nI05x8tMOyc0WZqmmE0SbY7d1J68e8hL:TkfmnI05x8tPqmmE07d1g

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

TEST

C2

46.149.77.25:8599

Attributes
  • auth_value

    8bc44a2d180183251d176d7b20ad1f91

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2552-56-0x0000000000090000-0x00000000000C0000-memory.dmp
    .exe windows x86


    Headers

    Sections