General

  • Target

    432-501-0x0000000000DA0000-0x0000000000DD0000-memory.dmp

  • Size

    192KB

  • MD5

    0a0962bdfe22daa896bb4c07c5102ddd

  • SHA1

    0574b1beca265dc5a9e733dc43914894a12013f6

  • SHA256

    adf6d2bdd5dafb2805b3e720555b94f4aae3fd7decd1b5526cdf86c5e34df4df

  • SHA512

    824095ac5bbf6e28c26a5d5824a7dfd5315bc7cf8afa72f12f1e5b40752f0d0289537438a7c0de5385bca59edf50aa6676ecb76c5968496d0a33d9642aba6640

  • SSDEEP

    3072:i1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JT8e8hU:grk/I0bmzulrE0U2E82F

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 432-501-0x0000000000DA0000-0x0000000000DD0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections