General

  • Target

    3016-0-0x00000000001D0000-0x0000000000200000-memory.dmp

  • Size

    192KB

  • MD5

    f27c8f44312a2a3d35db7cf73ac22c1e

  • SHA1

    0e9b4dc2f53a845c62ea735d193376171dc9e977

  • SHA256

    431f038acd59f275d3332cc1b85a706db3ba93517466537a8a0e9544b0262e2a

  • SHA512

    e3357090b4a01c052f017c61c9826cabe3945d509f0ecec2e6d16e2c7fefad8342a8c03258fe2935a6783a2f7988cd73d790debb34d7cc3d4967dec1553e6d42

  • SSDEEP

    3072:ecSRfLY0HI0quMxZVOTpdzbyWZbSE0OzdagVhSSJ68e8h/:ezRLHI0quMxZiSE0ynVhSSg

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1509

C2

176.123.9.142:14845

Attributes
  • auth_value

    e8ab62d10d26859f42bdbe0489305426

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3016-0-0x00000000001D0000-0x0000000000200000-memory.dmp
    .exe windows x86


    Headers

    Sections