General

  • Target

    5624-853-0x0000000000960000-0x000000000099E000-memory.dmp

  • Size

    248KB

  • MD5

    8aeae6325c2666b077971bec7272fe24

  • SHA1

    e22b1bd0f8ad168856d8c091877e80383135cf21

  • SHA256

    3b71d78a84c2d3e275fec20c5f0985f32615bde0021604d90bebbd8a5cca0af0

  • SHA512

    5e4d1c9ee02795b37d9870b665e3d0027de7bf36d1d9f793bf088d391e9433bf0f94f976b4486fd6d7a8e0cc829ff9da873e22f131b37467834f7b36ded37c46

  • SSDEEP

    3072:HJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRK:pDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5624-853-0x0000000000960000-0x000000000099E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections