General

  • Target

    6116-482-0x0000000000900000-0x000000000093E000-memory.dmp

  • Size

    248KB

  • MD5

    a3b5138319d3528fcc87c0ec8b75ba81

  • SHA1

    7aba9e1dcc669c38cbfc793c29f151d9a597e23c

  • SHA256

    f647cfb56455e4ace68c8db2ebc701049097a0ffe87513415a7b2cab4c110b7f

  • SHA512

    468d7993208544d808be2376773192849463f25b6091ee65b4e70902b1c3b2c9517c88d228b462df916c1e352a3fb2accadc0ecde2d79bf470c045a2046a24fe

  • SSDEEP

    3072:FJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRM:LDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6116-482-0x0000000000900000-0x000000000093E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections