General

  • Target

    5604-446-0x0000000000140000-0x0000000000170000-memory.dmp

  • Size

    192KB

  • MD5

    37ec93bc334c6e480c964bc191c98dcf

  • SHA1

    ad10b24c54365c1196dbe83d92c6183e8d0cec87

  • SHA256

    db65111af2c734f314dcedfe614058f1c3fcf35c3bb3200cb55c10843de6b1e0

  • SHA512

    cb17c19b7cc69e432e58ba0e1e703cf619fef8c30abb9019be831e8c23b33d613a7bd2f55a883216d22c768a3018ac969fcd9bb1fb01496135d3939516664c85

  • SSDEEP

    3072:c1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JN8e8hU:Srk/I0bmzulrE0U2E827

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5604-446-0x0000000000140000-0x0000000000170000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections