General

  • Target

    5284-471-0x0000000000B70000-0x0000000000BA0000-memory.dmp

  • Size

    192KB

  • MD5

    a99559359d7fc7c899477890cf024024

  • SHA1

    fadc867ca5d801dd0f9672eeadc7039b6b405138

  • SHA256

    93a2d5ef79b5e07719a908ce2f286e274cae2a20d0111232e7d4c074e57da273

  • SHA512

    e2a591b7d126b96111f1144dfb13a7a979ccc83f52666a604b7e5b6f1ecfa724f46763cb36d1326c1e38c29ac21d8f8cc9f8becc0f4bd2defbb030bd22ef120e

  • SSDEEP

    3072:/1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82Js8e8hU:drk/I0bmzulrE0U2E82u

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5284-471-0x0000000000B70000-0x0000000000BA0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections