General

  • Target

    1764-186-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    48c9db9f4f30c9aa7bbecd4047907af9

  • SHA1

    1d58bcbb9fd75e629403e6296624d3b789629314

  • SHA256

    ac8774b3d51a2eb3f49358955c71b8db65c84d3fdcdb99ac30f5223475d4e92d

  • SHA512

    9e89b3e85aa98e8347bef0ca96e4ca2022dd66ad86f5878a607bd52f651bafc13064f910bd392ca80ccce943d0573d016ce3af742cb8ac7c3cbf9119e717ea21

  • SSDEEP

    3072:91rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82Jx8e8hU:rrk/I0bmzulrE0U2E82H

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1764-186-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections