General

  • Target

    5880-536-0x0000000000730000-0x0000000000760000-memory.dmp

  • Size

    192KB

  • MD5

    5d7466533a4b09cc8a5ead949f4614ad

  • SHA1

    3d7bc4251ea6e3fbea2825e315eb6cb815158cdb

  • SHA256

    bf3b859fd3cfd9ea32fa6d52319685f245d26a30c9bf7ea4e9f82effb81b9c98

  • SHA512

    b6a5875beaa9be8a93f7da0f93b78c0ee6383e2b33990462f221664a407dca2757e17c70be707ad2913de42d52e29d60b1e39c992bfdc13796e3bb37b33fc286

  • SSDEEP

    3072:L1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JA8e8hU:Zrk/I0bmzulrE0U2E826

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5880-536-0x0000000000730000-0x0000000000760000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections