General

  • Target

    5692-494-0x0000000000420000-0x0000000000450000-memory.dmp

  • Size

    192KB

  • MD5

    7c52650610888e35cdd55af5a80462a7

  • SHA1

    b5e557a7b62fbd52addfb43e759677e326a9f3a8

  • SHA256

    f57a56c4634759572ba9bb62326b07007ec5b461456b79edfc055a6cf051a4b7

  • SHA512

    d69902f76fe7e08ba7699d9e98b04c4b5dfdb184fe40cdb56fe0ce4e2814f76e45fb7515847aadaac9fe6a36a4590ad4a19fd1bcfc69d61f5cbeed268656aca7

  • SSDEEP

    3072:61rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82Jb8e8hU:ork/I0bmzulrE0U2E82t

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5692-494-0x0000000000420000-0x0000000000450000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections