General

  • Target

    5372-509-0x0000000000970000-0x00000000009AE000-memory.dmp

  • Size

    248KB

  • MD5

    e340b0ed99b2cca43638d3f2987c59d3

  • SHA1

    22dede2ccadfcc99a49b18f3271f88d5bb26a3d6

  • SHA256

    c933225f2d258777924f7f0fe7f272cb36244ef52922b13458a2e2e8232ee53c

  • SHA512

    bc63d914b1b85715346230643d9aefa0a3496eee048bd895ef57bd294f0f04e565c80aea4a24ced3c6d15a46f5edb34001fb69d9421c8e10a5df95c3594ee8ed

  • SSDEEP

    3072:WJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcR1:4DPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5372-509-0x0000000000970000-0x00000000009AE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections