General

  • Target

    2028-463-0x0000000000B90000-0x0000000000BCE000-memory.dmp

  • Size

    248KB

  • MD5

    d2a08f33d7498f2f303714e65e7602c5

  • SHA1

    6263f2106461c4109a4c31e5349859a0f1e1402e

  • SHA256

    e347f021554f76de5f00d23af37ef7fdff30a367e84a550f27ff287b7e2461eb

  • SHA512

    9bd6e53d1f2585905a84729b77a1ea9b0c7143462ab9f49816048283226096346ef6c74aafa8c28820ec8280791cf633db0d734be24acc17ff7c6b47eaaeda22

  • SSDEEP

    6144:/WHOOQNgcKHCD2o/FdBa/xVs6CLlRXs1:/EHQNgcKHxo/FdMKRXs1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

larek

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-463-0x0000000000B90000-0x0000000000BCE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections