General

  • Target

    1560-547-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    9fa0ab7b8647bc48f6acbf7f953e8650

  • SHA1

    afc2645c2f8b8c0cfdb45fe445f469004069a5e5

  • SHA256

    905b9f521eef87e71898f37a95b4f00bf6fb7a5b2156bc4ac38f65b913a9660e

  • SHA512

    176623bbbafb46a36da7808229401ce98c43d1297bb8da9ac1891d0f1ab6c1eac6563fddd1a661d5bb619d5ef50ffb778fd8d2cfcc5ef6e6963eebddfab68a68

  • SSDEEP

    3072:A3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:AeGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1560-547-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections