General

  • Target

    5372-561-0x0000000000190000-0x00000000001CE000-memory.dmp

  • Size

    248KB

  • MD5

    5eb3a8369742404ab3320a72c52fdb5f

  • SHA1

    fc86f922565330c82a8e25b9bb37c2c821382626

  • SHA256

    6d9076d86ec23f90a8fc968555dff848fb79cbb5e207a15cc181ea9c9c3f0ad9

  • SHA512

    7178061dc8600d369f83c49a203cf55beac7b7db19872cff760841960846dd1b721b447de5f51fbebad54c16300a28cb749bae7952149a3c940405d5544f424a

  • SSDEEP

    3072:0JctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRv:yDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5372-561-0x0000000000190000-0x00000000001CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections