General

  • Target

    5932-379-0x0000000004900000-0x0000000004930000-memory.dmp

  • Size

    192KB

  • MD5

    bab1eed01973bc18331c68a4f987e763

  • SHA1

    0f0046dcf2f997e4b7ef561bfc0006798c86864e

  • SHA256

    a05a8d228702f860d9ecf4d237dfddd214acdb3ad011cc2c35c76689c616d4a1

  • SHA512

    abcf54545d26b60f5b841328100dd71700366272a3aa8e7d6e255b0f3f6f74ac8d0b2aeac8ea9157acb5bb94465f94b69d5a505648e834530672de6c3b2ceac4

  • SSDEEP

    3072:0ORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJY8e8he:USp3I0SbF/OVESYoqE0XmFuem

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5932-379-0x0000000004900000-0x0000000004930000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections