General

  • Target

    5492-505-0x0000000000830000-0x0000000000860000-memory.dmp

  • Size

    192KB

  • MD5

    53c05692f84f492a2b1e0fd29a775012

  • SHA1

    e7c861ac8cf5590ef866c42014e91e14510233ee

  • SHA256

    42f10b9449dc96cf882184d0558c79b8780c59b54a381670321bdfd29a58edca

  • SHA512

    546cdafa1fe191ff301d79ea4bfc2145285f3788d20cfa2ca58bfdc85e857104ac3afe6dffa1f8acf9a15617df944fe7e59142dd240fa7567101c4757cb8f451

  • SSDEEP

    3072:71rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JQ8e8hU:Jrk/I0bmzulrE0U2E82q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5492-505-0x0000000000830000-0x0000000000860000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections