General

  • Target

    3832-449-0x0000000000600000-0x000000000063E000-memory.dmp

  • Size

    248KB

  • MD5

    7cb1689a346b357cbf922bd05655478f

  • SHA1

    0f41fe1b62ae0d8afe1e7327205a7c0092872e82

  • SHA256

    50c4cda4370d0bbd67f2b903381a54caaaa5a2f75f06f99107969c4d6e8ee6ec

  • SHA512

    c69dffe2f43ef6fe784a889a75c7ed97c62d333f2061323f14dd5be785296026f86385806c0e627fdc65e28eb6a615ac94dffd0edfdad7908f0150c33354e38e

  • SSDEEP

    3072:1JctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcR8:bDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3832-449-0x0000000000600000-0x000000000063E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections