General

  • Target

    5680-288-0x0000000004390000-0x00000000043C0000-memory.dmp

  • Size

    192KB

  • MD5

    214220288c9e4d1ea96ac1f8af02c52b

  • SHA1

    ede49f7368fa7b906385cbffa40a1c90dbf4ab27

  • SHA256

    174a308b0aac034acf3014c10c7d1de7e11952fa11132d15f56f0703ac97ff9e

  • SHA512

    daa0c91a360804fcbc75fc5ba68e8efab7610ca93a4b96bc0280519a90ff2e6f4d018481d33272de42fe174fc10394576fc6878e484169536fb8dc2f7724d07e

  • SSDEEP

    3072:ZORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJL8e8he:RSp3I0SbF/OVESYoqE0XmFuep

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5680-288-0x0000000004390000-0x00000000043C0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections