General

  • Target

    2568-216-0x0000000000360000-0x000000000039E000-memory.dmp

  • Size

    248KB

  • MD5

    89ff9580a90a38a15519c09551ad64c4

  • SHA1

    9f2076333dbb8e398b766062f51024dbd5ae7a3c

  • SHA256

    1fcc939ea861a779db07074580701a4afcdf0a81b73c64e70fc582543343a2f3

  • SHA512

    7ec88abe664aeda34c1d52691ce6705366b5841893f2add46a7623240b15536b2269778ea9cea1c45c37a24aacfea3489d18dd748710d8e11ea60ad7937a84ac

  • SSDEEP

    3072:nJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRq:JDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2568-216-0x0000000000360000-0x000000000039E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections