General

  • Target

    4972-278-0x0000000000590000-0x00000000005C0000-memory.dmp

  • Size

    192KB

  • MD5

    05c41b3849976a5080235849cc05db6a

  • SHA1

    c593f43214939da7b88c56bae0b99cb90195cf82

  • SHA256

    58a861368c5f49b497e81656d7e02bc3259aa66d831297bcdccdc9129d663cc8

  • SHA512

    df16beb0fafea47d8de60ee4c55bcac3c89e396016552dd0edb39997bd8655273b37a51ca671312fa743571f49b2835438965e7673cd7686431e0ec533f1cdca

  • SSDEEP

    3072:dORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJf8e8he:FSp3I0SbF/OVESYoqE0XmFueV

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4972-278-0x0000000000590000-0x00000000005C0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections