General

  • Target

    2252-209-0x0000000004380000-0x00000000043B0000-memory.dmp

  • Size

    192KB

  • MD5

    b1c58fe49db6ebf5ef644394198868f6

  • SHA1

    bfc684b21b272422e768f2a9483c931557999987

  • SHA256

    28c26e89f22272dbaca27eabba8ccc9d130080207721dce3aba3d7af530186ed

  • SHA512

    ea17cf7527b55ffdf31bfbe414ab668494ee6f885de8c798b932a47cce2a51a04970cce5b2a5726d2c2afd5f815492580e329141de17f82799248c3bc6fd1884

  • SSDEEP

    3072:sORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJA8e8he:sSp3I0SbF/OVESYoqE0XmFueO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2252-209-0x0000000004380000-0x00000000043B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections