General

  • Target

    5984-564-0x0000000000340000-0x0000000000370000-memory.dmp

  • Size

    192KB

  • MD5

    af4d9affccad2091a601fe399afb1736

  • SHA1

    b6e9084aff7a021ea8b854b4a5b05b551b9abd5d

  • SHA256

    8ae212a0c07ddf7ac0976a9f1851e02489782f74277b2c95b9c53121ce4abb47

  • SHA512

    8d4d332b639a2ea82008f500cd1a785af3673253730e0936e0513ecff411f9c77da3578de291e00ef092452a8a7cb1a8a2179ba2bf19b58eed1e7ca91b647dc2

  • SSDEEP

    3072:81rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82Jt8e8hU:yrk/I0bmzulrE0U2E82b

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5984-564-0x0000000000340000-0x0000000000370000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections