General

  • Target

    2700-211-0x0000000000320000-0x0000000000350000-memory.dmp

  • Size

    192KB

  • MD5

    2a16d3a7c3432930269185e2994df335

  • SHA1

    3ecf7273f3bb2db3f189a4db35b736d86e6baba7

  • SHA256

    6bbd87b8784b01a6fca78dd8b197edf74e470557f311196acaca3da29708b827

  • SHA512

    ebbac98e31628582af039bf808082148d03071361167b391f11e63b3cb448140a0a479b62bc2c999b35095a575d7786adb7d0e4243e824d493368a83104d5c43

  • SSDEEP

    3072:K1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JL8e8hU:4rk/I0bmzulrE0U2E829

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2700-211-0x0000000000320000-0x0000000000350000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections