General

  • Target

    4868-292-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    0621afa690cd7f35bc3286347ed08e23

  • SHA1

    0131f836f62ef15c5cfde41e8a0f938fb5eb1338

  • SHA256

    9db30a21e3d582850e85f217e120013ad013f2cf7821bd4ee817f0cdbf5f08db

  • SHA512

    6786ab1f018dc969d95fef2b64513b18024698815a504d0040ed4b2d29edf81c6cbc3c3c9f6218c8a47b79a8e4518cd22258e204cafa4f3dc48857f066e41bf1

  • SSDEEP

    3072:D42f9Nnp6nVNgcz3uBc8z8wpGbt/qenTkfJE+7egcHF:D1Tp6VNgcz+Bc8od/dTkhTqgc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lada

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4868-292-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections