General

  • Target

    6068-511-0x00000000009C0000-0x00000000009FE000-memory.dmp

  • Size

    248KB

  • MD5

    07fd1c9f5b66ee3c2f80a1b6efc16e89

  • SHA1

    4062ffc915b40b0c26d582f595266ccb00ecefdf

  • SHA256

    50fb54797d0b87fa6c12026b2aeb6f9a0df99f26bb83887b7c588d6794d08b1b

  • SHA512

    9140d0335f56d0e09ef7c886fe9e122b9261e65184db6f7a5b4914514b71ce8a4e83a750ca8198942c4aaf1d6b878fc5bcf2e82cad1a02581f117a1ad12efa31

  • SSDEEP

    3072:BJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRY:PDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6068-511-0x00000000009C0000-0x00000000009FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections