General

  • Target

    0x00050000000191d667_JC.dat

  • Size

    174KB

  • MD5

    f4396c1ed87b95ef41c12b25d036bd12

  • SHA1

    e350849dcc265fbe5cf71451adb31167a02c3f90

  • SHA256

    d653c6c0af3f7037c318c679ae75028ce9405dd6015b4a5c28f0d2b46668ec68

  • SHA512

    4223510ce00a290b2cc9fbaeb97dfa13f693d56abd9766f0d5f219a9d64aae5200239716bdc436915d7134bef092bb5dcdb55b9f4e57301c9857abc0e1d139ed

  • SSDEEP

    3072:rhcAmySI0PC7vZObhfDmj/BRaUTE0EY4SJY8e8h8:rhNSI0PC7vjCUTE0d+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

domka

C2

77.91.124.82:19071

Attributes
  • auth_value

    74e19436acac85e44d691aebcc617529

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0x00050000000191d667_JC.dat
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections