General

  • Target

    3140-269-0x0000000000970000-0x00000000009A0000-memory.dmp

  • Size

    192KB

  • MD5

    d1758b477aab00d723d0aaffe2f0e4ef

  • SHA1

    2fda07445e4397b924bd25618c2d6ba1b50fdce6

  • SHA256

    0ac210f1cac00be1cd6b0a826da864ce4a40dd446a5d9dcb00cd112692889e33

  • SHA512

    6953668f9e94243fe2f27d7158691613d78710c3729ca6a07f5b9ecffddbd4d673e084f5c0bd2d71883109970691dfdc2d267e76b5ba0bd970e31ffcd5b92cac

  • SSDEEP

    3072:f1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JM8e8hU:9rk/I0bmzulrE0U2E82O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3140-269-0x0000000000970000-0x00000000009A0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections