General

  • Target

    1592-368-0x0000000000EB0000-0x0000000000EEE000-memory.dmp

  • Size

    248KB

  • MD5

    54bb7fa74fb8942bb29594473ace2605

  • SHA1

    211cf999869a2f8c1e0e71787e9728fd69c0564b

  • SHA256

    a6772a14554309e4ca55c600dbc5361dec19870bb148e7723d4f9204a1662917

  • SHA512

    d81b2f2065d0380208fda2c31b44079ce5fe06ce6ec31c123e2d746c10b049e96ac76a3646672896ba256b12d5a23d8308c00000b3a1fdca78233f89aa67d053

  • SSDEEP

    6144:vWHOOQNgcKHCD2o/FdBa/xVs6CLlRXs1:vEHQNgcKHxo/FdMKRXs1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

larek

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-368-0x0000000000EB0000-0x0000000000EEE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections