General

  • Target

    2260-155-0x0000000002070000-0x00000000020A0000-memory.dmp

  • Size

    192KB

  • MD5

    facb31b85e32a219b7b9ff6e7c11ecde

  • SHA1

    18dc13af1278b32ef9ac9ee313db82912986ef88

  • SHA256

    733086df06a9444762012597040cfebb66949a1a173f04d36808f1bf9acc7528

  • SHA512

    ed79f3c5b72f1735da05cce1d4846b695003efd400508b07cd145048fdc8ce4d42041e5abf8f55867da4ed3a2a2bcd8c0f5a219a84a2f44a280c97e2fbb15625

  • SSDEEP

    3072:8wvwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1J38e8h3:8OzAmmI0k7vVe0E0YIM11

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2260-155-0x0000000002070000-0x00000000020A0000-memory.dmp
    .exe windows x86


    Headers

    Sections