General

  • Target

    2580-59-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    779bca49689e14f8226cf364f7c69079

  • SHA1

    e1dbbed6d45611a59489ed324da2606431ece8c2

  • SHA256

    fc43a610c7467b0bf10c36c7820a5a4ce5f7b90ef25042bba541069c6d439490

  • SHA512

    953b27e225b010cf05892c6d7156a1a20796e45a85c29d692303465358faf8ab8ab6544bb83922e0f8a8d339990a72df4b9a7687e4caaaace7f8702ba03442dc

  • SSDEEP

    3072:AoD7WW2NsI0TFbfBtOUJwG1s5ME06+WrVTRwYJ:Ao4sI0TFbfBuME0vOTRwY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

0109

C2

65.21.155.238:31874

Attributes
  • auth_value

    5df1c1b3870e9b2e3d69b8278010bca4

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2580-59-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections