General

  • Target

    368-419-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d1e6658e8f158d5d5006f48d761045e3

  • SHA1

    4b9973fd40f6afc2f5f7b84f26f6db510ce300f5

  • SHA256

    24aa4d34d2eab7e7a718f715576263d5eb0a8cde42d6320e28fe09ee44891543

  • SHA512

    a41dcfd0ea29aea26efb3d61f755684ae03a1f818412b14dec785c75f6a4813a91661d091f49cf42996f777934d2413fcea6f66c10b214d79317b3ac213db92c

  • SSDEEP

    3072:VIsoX4oBpI0/bGdkBORITkZevXTE0MIzlbuqDcJo8e8hl:VIDpI0/bGdATE0BzkqDcO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

installs

C2

162.55.189.218:26952

Attributes
  • auth_value

    4bdfa4191a2826ff2af143a4691bab78

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 368-419-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections