General

  • Target

    2536-219-0x00000000001D0000-0x0000000000200000-memory.dmp

  • Size

    192KB

  • MD5

    180e3e611a82f2372e3021b3cf8fe85e

  • SHA1

    cafa77e19a55d14e743333341e53e0735d3723c7

  • SHA256

    5543a6e86680babedcaf98bc289d8c9953f411e16e92d9128028f16b403146eb

  • SHA512

    4ade8bc56985052bb2e55bf778a266cb5506a5de2ffcd3f9fc7cc810b84caee39ad10874425444a11fbb434f6e2b745aea785d8cc8755b0ab3423501871438aa

  • SSDEEP

    3072:F1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JS8e8hU:Drk/I0bmzulrE0U2E82Y

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2536-219-0x00000000001D0000-0x0000000000200000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections