General

  • Target

    3356-518-0x0000000000500000-0x000000000053E000-memory.dmp

  • Size

    248KB

  • MD5

    16c7d473a39d4663f12c241c187e9311

  • SHA1

    fdf0480d5fe797385916d4d3f7863d0245bb47eb

  • SHA256

    789f364eb644cd8830089429c6186559e40d64e6fead6667e4e0340642a56507

  • SHA512

    b74a0f588e91a0b023c7f83c3ebd6b004210db2c1d13d4c4e3d9dd4c8ad8620c62fe7f5268845afd5cff4601a1f29a143e59fa295ce2d20636c19d2c3354132a

  • SSDEEP

    3072:FJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRM:LDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3356-518-0x0000000000500000-0x000000000053E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections