General

  • Target

    2560-47-0x0000000000080000-0x00000000000B0000-memory.dmp

  • Size

    192KB

  • MD5

    22352ee609cf388771c7f072a47ee9aa

  • SHA1

    97658fc85872b5ff342fb0b240b261bafb9083e8

  • SHA256

    d67e0420a9f00bdb4fdd1755e697e6c0e9e08b715f4ededb5bf42d5c40e1aa0c

  • SHA512

    06b1bfd4398927f8b79300af9acc122c4a22b58c8e3171f1132b95393a6c4620e06aa93b235a8e3a4d5725dd09410eedc3a28fdfbfdad4df885340b6fd43f3d7

  • SSDEEP

    3072:/aQitqjuunI0itavHOfAp0Rs6TRAE0IVHD9S1DE66NyJ88e8hZ:SQdnI0itav76TRAE0uHU1DE66NyK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

uber

C2

95.217.64.18:12411

Attributes
  • auth_value

    d8b978e78c038f064839ea1c7b59b069

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-47-0x0000000000080000-0x00000000000B0000-memory.dmp
    .exe windows x86


    Headers

    Sections