General

  • Target

    4568-36-0x0000000000560000-0x0000000000590000-memory.dmp

  • Size

    192KB

  • MD5

    80f7726919e88e632e7041ef584577dd

  • SHA1

    3a76e10a8087f5affe95391f7dc306f912025329

  • SHA256

    ea3d386d785d6c846aa2b085b8c6fe01380019e6d59e5614caaa4fc228bb61dc

  • SHA512

    301342dba448cde0f3b21f565505d4e0e67b81b655b9d379d269666945090880b9e72e451d7b1e1c88ce77ff2daf44d162d90ab9bd41aa0e009a66d060f69ad2

  • SSDEEP

    3072:8wcwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1JG8e8h3:8BzAmmI0k7vVe0E0YIM1o

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4568-36-0x0000000000560000-0x0000000000590000-memory.dmp
    .exe windows x86


    Headers

    Sections