General

  • Target

    3508-0-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    75f6f140bb1588dc8cf70b3106e938b3

  • SHA1

    0f827e6fdcdf06b3149f8d2610d4c9407e565960

  • SHA256

    83f56378f7982ea35ba1dfb8812b743995b1f813fac6c2cb414b5fd2483446bf

  • SHA512

    df55262e28d788e1c01bdb8ad83494b6054f3ec00d5fe7147120a9a36e439712b6db1bd2ebf4d06552bb8aa6916dfba2d389875567c09e67fde9e3860b7f1707

  • SSDEEP

    3072:eV+m5cBQmRSZvoaEChJpxAx++ehKZx8e8hC:ejkUoa9b0ehKr

Score
10/10

Malware Config

Extracted

Family

redline

C2

5.42.65.101:40676

Attributes
  • auth_value

    4d9d55e0d25abf3994c284bb426fc7b9

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3508-0-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections