General

  • Target

    1748-479-0x00000000002D0000-0x000000000030E000-memory.dmp

  • Size

    248KB

  • MD5

    4bb76f6b6620fef0491781b217ac279e

  • SHA1

    5bde2334bdbbb84366299469e48428f90b3f96b1

  • SHA256

    1bbbd4605d7432ac2588f2a2db04a1ff72c99ecda6e186daef594245c7df6eba

  • SHA512

    a5390255d8f16e05c3d32da468e861e41e44e38241d7a5b45982dbc53cc7abf3d56df3b3e008dbeb77deb726ab68847f16afeebbd4c987c33b8b947feb0710e7

  • SSDEEP

    3072:IJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRT:ODPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1748-479-0x00000000002D0000-0x000000000030E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections