General

  • Target

    4772-422-0x0000000001380000-0x00000000013B0000-memory.dmp

  • Size

    192KB

  • MD5

    123d50a2d7b8c41bbbbe7ddb3c72ca89

  • SHA1

    45e3f747a6dfdfe4f61c8f8e38e7e824eccaac85

  • SHA256

    9b0d3e785f42184228f226ab32a2cb35d34be5d0ca099ab8135aeeb84c946223

  • SHA512

    03d30adc21ef380ab717ad0ebb5ac22ad95697516397b13dc1eab4072efc9a535946925d5bb753d1d339b0d11395b690d24b1f0c54bfe3fbd928fcb2c1e79324

  • SSDEEP

    3072:b1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82J88e8hU:prk/I0bmzulrE0U2E82K

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4772-422-0x0000000001380000-0x00000000013B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections