General

  • Target

    0x00060000000232a9-43.dat

  • Size

    174KB

  • MD5

    5f4ffa0b1d16947f4de0f5cca824b101

  • SHA1

    5ce47f75efbf4ebf6440764474afd50383e0fbb9

  • SHA256

    930156a9d98979a84044c1c04c86102df70897f8de8f87310c69433f8ae8dddd

  • SHA512

    842f904bfb5cbac989cafe8f5e7a8f089fc323f5c94ee6134f2b9a5c8b830bc06f7e1f644cd713477daa5fc3b3ea33022688445fb485be3b92c7c3e5ec3a685c

  • SSDEEP

    3072:rhcAmySI0PC7vZObhfDmj/BRaUTE0EY4SJY8e8h8:rhNSI0PC7vjCUTE0d+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

domka

C2

77.91.124.82:19071

Attributes
  • auth_value

    74e19436acac85e44d691aebcc617529

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0x00060000000232a9-43.dat
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections