General

  • Target

    5144-426-0x0000000000B80000-0x0000000000BB0000-memory.dmp

  • Size

    192KB

  • MD5

    17ce569db0f52ac738ebbad45d649422

  • SHA1

    a540168a7707afb0e07f46b570c1a837d2f5a65f

  • SHA256

    d47aa7f3035fc2a090ae8461aae8b2eccff8bb0538b2a2bd45a40fd4f1e31a05

  • SHA512

    5da85638c1bf8ef7c9c3ffa34fda7f22c01b4cbb495b04c6d8924a1a23e97b6e3175137898c8469d2339b487d7976f66260a12bfdcdfaf0ea95f4cbf45d2bf5f

  • SSDEEP

    3072:w1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JJ8e8hU:mrk/I0bmzulrE0U2E82f

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5144-426-0x0000000000B80000-0x0000000000BB0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections