General

  • Target

    956-264-0x00000000002F0000-0x000000000032E000-memory.dmp

  • Size

    248KB

  • MD5

    007f48ee6a56cb040b788e09867605f8

  • SHA1

    5a2467ed988508f6ea1cc2f3aba7dfa8ab7f5370

  • SHA256

    df10d47d47100be025812b4ef631d2ce9349939b551ce4f019a016ee8bfd90b4

  • SHA512

    f80f668e7f22568096a2550f40f05d110c35db94542337fe83baf161e88f3ec18b6d4146f2c0a032790f44f118c9803976d065e383744203e900ca4efa39ff90

  • SSDEEP

    3072:VFyOHrnNNgchKkRm8pyUDv8ZTYllt/q0ePfm/lpvSLaez:VFyOLNNgch5k80UDGYp/mPfmdJSLa

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 956-264-0x00000000002F0000-0x000000000032E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections