General

  • Target

    4888-124-0x0000000000800000-0x000000000083E000-memory.dmp

  • Size

    248KB

  • MD5

    242857addf8d40bbee9b8030266df519

  • SHA1

    8820b8d0ad4b72030678f4f64337fda5afe0a1a8

  • SHA256

    3efd36eb6f8bc8119f48bde98d0338d7f94e44dfc8419ce23e6c5c2d8b6a88f6

  • SHA512

    50bc6e4f1043e9b999cdeef8659a891a9d0660af0a8429338cca7891722a2c8bbaafbef529d1ed997352224aee95852e48253dba74ba8dd782efb54d26ec5e3a

  • SSDEEP

    3072:VJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRc:7DPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4888-124-0x0000000000800000-0x000000000083E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections