General

  • Target

    5640-435-0x0000000000780000-0x00000000007B0000-memory.dmp

  • Size

    192KB

  • MD5

    0c9240c25a9c46349979c3f000e30f86

  • SHA1

    7f733cd0213c5a98bc6373917e1f49afc71ff0f3

  • SHA256

    594e54f6a5a36f7044481226d6a8ce53a943eeabd2c7240700e17189ffcc6454

  • SHA512

    8970f48bae873b3cfde03f747a0e526d88f887fbfa6221055a452b36db7a0e3951a034e1560922158197ed73fb47aee1a7b29c308dd04d46e98a12da30e36615

  • SSDEEP

    3072:w1rfs5//I0bmCKugObCKR4eSwbD1J19cgrE0ML2Oam82JJ8e8hU:mrk/I0bmzulrE0U2E82f

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5640-435-0x0000000000780000-0x00000000007B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections