General

  • Target

    1444-0-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    8422cdb99977329d69866d0f93910861

  • SHA1

    312703d631341ba339468ebf817774b58c377d4e

  • SHA256

    d6af7834ec657c2e98cc2b8838b5529111a5f56216cce321fe827bad91d7ce90

  • SHA512

    b8fc5725b5b7f0969c39ff5a255a80f069ed8f6800fbc143cc433a8decc3b95af76aea7db5f89c4a6bb4d1198c027caa988116b45fea46b6a2a08020ac57c843

  • SSDEEP

    3072:0kh2yqg5JI0SE9BbOXtgwXRPulE0qd3nJNgJz8e8hM:0kh2YJI0SE9BplE0g5NgJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trafico

C2

176.123.9.142:14845

Attributes
  • auth_value

    ae8f72bc34fc0c248b3abb9f51375751

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1444-0-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections