General

  • Target

    2012-22-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    c7563efe4f4b0a504ab8b1af73855171

  • SHA1

    193cda20c1ddc726fc509ab94750089cb6bd679b

  • SHA256

    07f20d01178e6bda22362d02e5c6994f14cc41764981654151673b09f49d29d2

  • SHA512

    d928a72bbd3ac36d35a9a56ca2772e67315ee3d71d75559c09cd8ebcc6e2910b6b2d0bfd945c16ee3ad77c0a6924c134fd86d028aa71a5e2f1ae1e21812f529c

  • SSDEEP

    3072:5BBgjShnANgcMdYFsLVOlL+Mvt/qNt6wEIM9hmJYVvlnokt:SjkANgcMeFsLolL71/G6/IyhcYVvln

Malware Config

Extracted

Family

redline

Botnet

seevpalpadin-103

C2

38.181.25.43:3325

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-22-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections