General

  • Target

    4604-725-0x0000000004F60000-0x0000000004F90000-memory.dmp

  • Size

    192KB

  • MD5

    5bbe53bb6867b95790044c4809771335

  • SHA1

    c45bb79890cfc44ad892e863caa5ca808e65c3d0

  • SHA256

    420649ea7a19e6c38896d56cfb9dce0b83f335c8cb8d09b9ac8be6abec3178e8

  • SHA512

    16251637104bb60a82f81fbc7ed859c39897a0ca7540a7007cf03a500f6f66043cf38d9f98810cb5a017ac9c1620e3798426fd221ca10771fac7cb1957e0dec0

  • SSDEEP

    3072:2ORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJi8e8he:iSp3I0SbF/OVESYoqE0XmFuek

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4604-725-0x0000000004F60000-0x0000000004F90000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections