General

  • Target

    4420-282-0x00000000003C0000-0x00000000003F0000-memory.dmp

  • Size

    192KB

  • MD5

    e4028140d3f2723c11dd404a63258e1d

  • SHA1

    d73ef75a03db9d65ce5c7b32c5df6c491018550d

  • SHA256

    b2e0073c2b3dbd7d09adcc0f2b183d093a1c32ac9022f406e6de8ce989b67e9a

  • SHA512

    7d6021a81a2c9e5c67fce4a8551b5f14b4922eb8d8d5fcd508520a2acf3b37490c2fd71a044348c9a72bc3f60b6e632c2e437f3837e5495e8c25f23359ff51da

  • SSDEEP

    3072:01rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JV8e8hU:ark/I0bmzulrE0U2E82D

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4420-282-0x00000000003C0000-0x00000000003F0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections