General

  • Target

    2000-632-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    7507572aa7cd4609a420c9c7621799c7

  • SHA1

    980e6cce2a6ed78642b6bafe6fa3b10bee92a1f1

  • SHA256

    9af0848bf0e299e0df4b93e4526035e714107922faa0f40a2653ce3943c5000e

  • SHA512

    49affac0f652cca17cadaa2e6ced49353be3f0a703dbfb6448f5efe911da337023c702cc04fa96910b10858619cef3325bebbc287ee35c7d5a80f6951c179f94

  • SSDEEP

    3072:93HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:9eGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2000-632-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections