General

  • Target

    1584-769-0x00000000000F0000-0x000000000012E000-memory.dmp

  • Size

    248KB

  • MD5

    d623c239c44066f737438fc2e0f922f2

  • SHA1

    9e57836f0c878641aaa1443c4b58f8033f600979

  • SHA256

    0cab7027e2b44a3d7698f38b624e66412cfa3307c5a70d8d1faf1f624c537b08

  • SHA512

    0560fa8476dd00d0773ffac65eed352e442033f64ecbbb736975e46bb906ff827d647fe602e43218cf93276e0e4335acece6932ab863e4bd7ff0172d61922989

  • SSDEEP

    3072:62PLqOze7nDNgcYde+t9P/Kt/qbe9aKC9GYYOtLDa:60Lm7DNgc8vtO/D9aKC9V5tL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

clientfile

C2

194.180.49.159:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1584-769-0x00000000000F0000-0x000000000012E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections