General

  • Target

    2652-44-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    e91a825fb695b471eb195fcb68931dfa

  • SHA1

    96e2a49d482091eec3756a8ac283d74817db6288

  • SHA256

    c0258a37f344238e0a23e0ad8e3b957cb26b64fd826dd19e5b94685a0835950e

  • SHA512

    bff8f938292d97cbbe1dda3e4305b04d35981fb254f9d146f002d34b45a2a6677823d87ff11f3e4e245185b410f9b8fbc8f518df40a3f77ef64e710d84b36824

  • SSDEEP

    3072:MKHYcacxuI0tFVmJOHgLqxHrN+E0C0GLdtHJ:MKHLuI0tFVmiHJ+E0aZtH

Malware Config

Extracted

Family

redline

Botnet

seevpalpadin-930

C2

38.181.25.43:3325

Attributes
  • auth_value

    e6927db74f64e90a4b02f736972d9d7c

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2652-44-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections