General

  • Target

    3056-4-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    05d739bcdc5f7edd77cc15cf1243d3e8

  • SHA1

    1a5443835cee8cb5ca2feef672805933bc84a480

  • SHA256

    0f8b5dcd2ece5dd1a123b054c9a11fbd823d18252e97f157437be7adc5f62402

  • SHA512

    c2b85e9e43e6dcc1c5d1b50c5fa2c3c0cafd228485b3adb98d0709102800d02949e291ae2f9572c8198fc36b3a385e3c80b4a1a3b790ac28761ea79c94ff69be

  • SSDEEP

    3072:s+9uI0YnwNgcXlme30xWZ6wvXlt/qU6K/Gm85ymTM:sCuILwNgcXUi0xWN/WK/Gmgyq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

frant

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3056-4-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections