General

  • Target

    1560-609-0x0000000000180000-0x00000000001B0000-memory.dmp

  • Size

    192KB

  • MD5

    2bbc5948cd619569d1c51512774aadbe

  • SHA1

    1d352c5abbcbabbdc70422fb9aaea724f6993ffb

  • SHA256

    e0c09ae23e9fb928dc7786c54fcb780998ae3ee423440de3be9bc2b680a4d6b6

  • SHA512

    6f5b037f4be95d5ccc740deb2f832eb36f8cc68dd5e84ba2f13712c10e79261ffe74a5c1c6b082f9849c7e83924ccd3eec7f49650942ed99c62dd595f7cc63ac

  • SSDEEP

    3072:Q1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82Jp8e8hU:Grk/I0bmzulrE0U2E82/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1560-609-0x0000000000180000-0x00000000001B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections