General

  • Target

    1936-64-0x0000000000590000-0x00000000005C0000-memory.dmp

  • Size

    192KB

  • MD5

    a7187e28efa54119d19d4fbe55afbb0c

  • SHA1

    298890dce8ccb0562acb6edfaeeb32c0179d43c4

  • SHA256

    346fc5728d579b7d2f56f862ce4af956b37318d990286ea5ae6835fb7ba18b27

  • SHA512

    d507b18e591ba02abf1323051e1f2e77a2c48d56fe134809b70f5d109159a90a1a8f9d1584e4e9eaf6526c5b1dd70342293ccf596cb3736857baba608ee6fe2e

  • SSDEEP

    3072:KiZIEVII0FNuHZOJpFLizeIkqffffffffffffffffffffffvfffffffffffffffm:KiVII0FNuHYIpffffffffffffffffff3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1936-64-0x0000000000590000-0x00000000005C0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections