General

  • Target

    2924-307-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d9286c1650bfd1fe24aa0c80eeeac8c4

  • SHA1

    54ddb8de0a272cafeb2af875bb194e63df68a8d8

  • SHA256

    aaa8770dcf32d2a3a3432f7262346f6fae7134a336d53c824629327626667b7c

  • SHA512

    7d56b3eb754759b3833d46bd234a23e4923c81559602ea694cf80fd3ef0281840d0ede4a577670df3fb92a29d741a59ff72ea46ab23320e2f2a228ee03155081

  • SSDEEP

    3072:0ORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJM8e8he:USp3I0SbF/OVESYoqE0XmFueK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2924-307-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections