General

  • Target

    5660-293-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    1684f65983f1220afa7992bd65eaa764

  • SHA1

    39a3bc8e5eb2b838f1633eecf4ef3663c124e959

  • SHA256

    1b44375061bd91c1449b2317d9aa2e680f5aec613cd9837f54e25e353f9c3079

  • SHA512

    34cc1b645bd1cabe57d48b349a62400e346c937b873d662d128ffb55e3e6be37221a408b551ec7111a94025e95755dd63e5b5c78b1e8350b285ae00eef69d220

  • SSDEEP

    6144:HddhdGNgcl4+xlV6+MRleJ/+PU1raKSuXyAXO/:HXPGNgcl4+xlV6JeJdSuXyAXO/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

genda

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5660-293-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections