General

  • Target

    5532-540-0x0000000000F00000-0x0000000000F3E000-memory.dmp

  • Size

    248KB

  • MD5

    561b8feb3171c3beb83eb027b4bc111d

  • SHA1

    1d7aa424de499183e4ec6861c540281c75086608

  • SHA256

    8952fc2e996cfbd6264e7f6d24429354d3b0df893c268088df828374b570d6f1

  • SHA512

    25cbbfb4522703f5bf7a9701cb74959aec6fb87515434cb7cea43d4119be941e7873641e22ae0597c50033559a2565084cd48991fe01b9959f8da2c25d0ab078

  • SSDEEP

    3072:lJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRs:rDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5532-540-0x0000000000F00000-0x0000000000F3E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections