General

  • Target

    5884-618-0x0000000000E00000-0x0000000000E30000-memory.dmp

  • Size

    192KB

  • MD5

    6bc7c6e0c97f8d7e78619644f9965263

  • SHA1

    aa38cfc362221dfd215a833cafa836c7f0ea6005

  • SHA256

    1524801654170b6670720acbebcf8a086f945b2b8891024be610abe245528585

  • SHA512

    1ef3e0c06bfa045d5c0cc2c3c9a07bb32092381d220fd8e466c133a9fad5bd2988346c36e0148d22157a316a73afbdc1c6b5fccca154188b505091a45cb87c54

  • SSDEEP

    3072:o1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JR8e8hU:Ork/I0bmzulrE0U2E82n

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5884-618-0x0000000000E00000-0x0000000000E30000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections