General

  • Target

    1896-293-0x0000000000480000-0x00000000004B0000-memory.dmp

  • Size

    192KB

  • MD5

    87322b83745b2c1a36c9b48263ef07e9

  • SHA1

    f10b7789b3c7e41df33e7a7cf6b8bd932d2074d8

  • SHA256

    f973b0e278107a498505c624e36295e95061b475cff9a7646518c7432bc6e46a

  • SHA512

    8742f02045bc827781cdfab218decb533579d90faa33968225baa6ce740d5efc90bc11f0104644d113808667fd8572669fafb59fde048e992dc058c893b390b8

  • SSDEEP

    3072:g1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JZ8e8hU:Wrk/I0bmzulrE0U2E82P

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1896-293-0x0000000000480000-0x00000000004B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections