General

  • Target

    5284-631-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    4caf91de0c0ed2db3fbe04724c521624

  • SHA1

    6c19789d79e01a97a644abd78ee8ce615212fce5

  • SHA256

    c5c31d4800a40613663dc0b41bff129c0fa8afcefae999449f9c95fc0f0c7678

  • SHA512

    4b14d1a3f0a5645bbe571717b102ef29c097568b46bd8a6d7aea65e76fa6e6bb831e33c8947289c85cb77e39bbc0e9d4b311e793a9c5da4f7de8973bbb9c630d

  • SSDEEP

    3072:N3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:NeGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5284-631-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections