General

  • Target

    3456-410-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    ef72311372c5230d17a9f1fce8be39d3

  • SHA1

    9b14014233b28ad74583393c4c4b9925f14d71df

  • SHA256

    96e53af02edc0ac00edca1f36bd0abf30573d37c009b8780dd948469efdea55c

  • SHA512

    b3dd5167aa6e05b8cc296d7c032a38c1c379da25a676513accd2addb084f8b899675241029bf3e193da02ded58249347a359ff0f3f81aeeb3b3464565821b3e4

  • SSDEEP

    3072:C3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:CeGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3456-410-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections