General

  • Target

    4656-32-0x0000000007650000-0x0000000007682000-memory.dmp

  • Size

    200KB

  • MD5

    70ffd822f1b277134a2fea7eb6b75d49

  • SHA1

    d78cd89ed7f890b96276c5d542b2cdc6a7185d16

  • SHA256

    133b14308be9de592faaecba584406c973be65f5e8bcff02f5009dfbe096ba70

  • SHA512

    18a2204a6b5d5688254965da7a1f70d5074759fa33ceb617cb852387ccf44185aac40b3b3edbae34abb2712596d92e9193b3eaf20ec42ad8f7beb5dce197695e

  • SSDEEP

    3072:/mXHIc0EXleeg83NADE0MtFc6pq4LVJgJl8e8hP:uXT0EXleefCDE0YFK4LVJgj

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

vannhiemads

C2

103.145.253.245:20451

Attributes
  • auth_value

    d2760b2363aecac5ea1300ca8c249c10

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4656-32-0x0000000007650000-0x0000000007682000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections