General

  • Target

    2520-54-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    01b02b5315e4d8b4870ea0b04b9ce757

  • SHA1

    263bca2715978c2aa9a48e16604adddfb0d43a61

  • SHA256

    243f52f17092adf62c57a768df4b3739df79511c9d3954fe7fef54d4f30e6285

  • SHA512

    8aed6c8e1e16ba85c815acaf693683fc4a9e45e0159250d4acf71407d29136e64095ac68b6980f78997cfe8af74cf198da055978743aed186082963f26309391

  • SSDEEP

    3072:8wJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1J:8zAmmI0k7vVe0E0YIM1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2520-54-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections