General

  • Target

    5564-494-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    a07c4a04deca7db15998007c4e3621b4

  • SHA1

    95b48bfe3bb95cec850e99b16966d8e84300de07

  • SHA256

    f532b4b0c19d39766e40c88bb2ffdbdceceed636add9c91a86fe2c22dfd32e43

  • SHA512

    ae041fe2e21a40577835b92c91a3fae3b79aef0f6918995c9aa35bba6eb94f028701e1f4bc22f0e9054d125262e3f6a5517c167ac071344a786ad6d935cc70dd

  • SSDEEP

    3072:VJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRc:7DPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5564-494-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections