General

  • Target

    1872-24-0x0000000000680000-0x00000000006B0000-memory.dmp

  • Size

    192KB

  • MD5

    1dd6fe1ccc93b3b883396ca53560d347

  • SHA1

    ec87db2c42602041e8691f7f4be85129b5bf0cb0

  • SHA256

    5307f00beff7e4f939aacde81a0e54950ed38650640f9bc3507ad89ab9f82770

  • SHA512

    3754077f404f58a821b1c5ea3bc01955fec691f368df5cdcd622ff96e425d8bd74659232a379a8bf5ecb3ea2873b03035c19ab423799e46b91fbe60250b41884

  • SSDEEP

    3072:8wVwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1J88e8h3:8QzAmmI0k7vVe0E0YIM1q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1872-24-0x0000000000680000-0x00000000006B0000-memory.dmp
    .exe windows x86


    Headers

    Sections