General

  • Target

    4984-439-0x0000000000B80000-0x0000000000BBE000-memory.dmp

  • Size

    248KB

  • MD5

    7821b07a47394d79066738bbf825e909

  • SHA1

    a81b802e390c26c470db239a88562ba2afcb2444

  • SHA256

    c6caf518f917885d34ba31ad43634791e0e6f9217bdbb5acb6c8f9f748b0d0be

  • SHA512

    e467f1fc4297df9f643bed05053a35abf398e22f090a13d196ea1644c14103a5a472c26d43f8af44c3ecd05177f0f2e6e9f7d126b083a8ba86dc894875acdac8

  • SSDEEP

    3072:NJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcR0:jDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4984-439-0x0000000000B80000-0x0000000000BBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections