General

  • Target

    3772-555-0x0000000000980000-0x00000000009B0000-memory.dmp

  • Size

    192KB

  • MD5

    433eebd472b5a936ad909422086061bc

  • SHA1

    bb07f902cc560b18d1c1149e584d5ffd1c60e13f

  • SHA256

    b485c7f85927c599a78542be319172f4986acd172a8f94fa8dba5944934e8578

  • SHA512

    ecb2e977f6c99aef57baf9d0978cc24181042381efc68f005a332dfa9b1e062d7ea17e360a32c7143d3d4c859429365894c1bb2936052c386eb8f061dacc34f0

  • SSDEEP

    3072:Q1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82Jp8e8hU:Grk/I0bmzulrE0U2E82/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3772-555-0x0000000000980000-0x00000000009B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections