General

  • Target

    3684-2-0x0000000000790000-0x00000000007CE000-memory.dmp

  • Size

    248KB

  • MD5

    aa2f1696cbab4bc90ee64f25d76a4955

  • SHA1

    cb6dac8e171ff4584a35a9be94c44f420b379c8f

  • SHA256

    69d44fe7eeed3dc36001fe903ddbcb80e44ebfde88f343adf71ba7f67a090d60

  • SHA512

    026fb0cfa081a2152ea2a3e6f295c5130607bf43ec609f06beed5bc43599118cd75e1cbd749d9f3d524d1d295fad6f5231fdd809cefbe631ec739c0df5564c62

  • SSDEEP

    3072:TrD65ndNgcS6mSyevdGQGVQK0t/qo26jM3OCkWEW47C:3DAdNgcpnvK8/O6jMeNWEW4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3684-2-0x0000000000790000-0x00000000007CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections