General

  • Target

    1064-9-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    ff727901ff24d54943eef819d3e8cad1

  • SHA1

    404cab7b08e52b3bdc18d10a85d4c0fb0f3ecea7

  • SHA256

    50e87d0fbf19da6da300045e5b13dfbcd6b5b401421b695e4b46bf451d0382eb

  • SHA512

    e70972281de9388f2772653600caa70a65cf672057682f80bb24c758c41015869800600e925a91342a72634502884d172bb5392aa863cedc5a3cf4db1d4dc0ed

  • SSDEEP

    3072:lgFIgREj/0I0YmTpgOOpwhjKPukE0evg/ufJg8e8hH:lgFY0I0YmTpLPkE05ufm

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Site!

C2

46.149.77.25:8599

Attributes
  • auth_value

    9e2dd9946d8763e7fc5ec23f17f1ec22

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1064-9-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections