General

  • Target

    864-1132-0x0000000000290000-0x00000000002CE000-memory.dmp

  • Size

    248KB

  • MD5

    88a5102921d76b2212c77a660d812fa4

  • SHA1

    181df6d6b84841ffdca2c7ee662185c1dcd6f5b6

  • SHA256

    98851c8c91ea38884e38926b3dec924be4b3c779fec6b78fb32439bba5b3d669

  • SHA512

    db00a0bbf219bda380f1d8cdb122046b3ca4e8b724dcbced7234a4ca1d878021d7d2b3a4ea41c61e9d25d88fa8a2904b95eeebb7ac46efe1d97f40ef74b11fd3

  • SSDEEP

    6144:wWHOOQNgcKHCD2o/FdBa/xVs6CLlRXs1:wEHQNgcKHxo/FdMKRXs1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

larek

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 864-1132-0x0000000000290000-0x00000000002CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections