General

  • Target

    5572-595-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    0ab78a755ab27705cda5ac8d8c2fc7c2

  • SHA1

    f13a2eff9d2a0561f1750b78922746984b856889

  • SHA256

    1a4b0f3a97401ad974dca505562b6feb81819987fe94bb4821ece34976357a33

  • SHA512

    b099d8f8694ade9300bb9c5e4bc310d5d64a2e8b7b9b5fdceb35b802847f0c2e0eb8530556503b1d1065b3c7b61bf44b52c80ff6016177d64f5abc60a7faf1d0

  • SSDEEP

    3072:e3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:eeGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5572-595-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections