General

  • Target

    5504-317-0x0000000004960000-0x0000000004990000-memory.dmp

  • Size

    192KB

  • MD5

    18c35c17b77d8f5dc5f081415a5144cb

  • SHA1

    99ee7cf5f1ae5a529fc91f6174df9327fa01f8fd

  • SHA256

    3ca27525cb7c7e5673e2fd542d48384448ff8749e84b38c4b00cb78573b9b6e6

  • SHA512

    dce1b8eedb83d564890f3c17b2ae4b237a642e0aca873539def45a5c676f93ed731b2ec1ec67942c4efb56d11416fb257cd3c87da02e4854a4f357a9c7b3bc55

  • SSDEEP

    3072:WORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJC8e8he:CSp3I0SbF/OVESYoqE0XmFueE

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5504-317-0x0000000004960000-0x0000000004990000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections