General

  • Target

    2112-220-0x0000000000430000-0x0000000000460000-memory.dmp

  • Size

    192KB

  • MD5

    93fd599a833f925b45cc7c8a9d789728

  • SHA1

    815cbbaf797b6481f497bb3717a5b518fee0d9d7

  • SHA256

    daa6a229af3311743f72adcfa550f9018c74a38a4a352b888fb40666ca5a5a6f

  • SHA512

    e6b31976cd6c528ae9c382f041940e8bea83b1f5b6bacde0c53cb65415c9efb48ceca31891a67c8e482a9a381a11a469fe69222d2e3b277a088fd2f638bbbb9e

  • SSDEEP

    3072:71rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JQ8e8hU:Jrk/I0bmzulrE0U2E82q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2112-220-0x0000000000430000-0x0000000000460000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections