General

  • Target

    3800-0-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    2751942f2148d4cf0a47551ba3f477a6

  • SHA1

    8096ca6f31f4b8a6bef97495d253469412239a29

  • SHA256

    6eed9b99e3c7444051035881b3497c5674e9cfc1107505712a685ce5d39f0d54

  • SHA512

    9924108002ae14a1d0bb7121a1e78952a3ac5fc48228dea396b366e9be2b367a39a58212851cb5f56122c34bbcd27b1b97dbbac29bfaf4958e0176a9c0e7f65f

  • SSDEEP

    3072:/CW+rbu4NnPNgc1w1DypU6ZUvkBw2Etzft/q7JtMrmKXc6ZyLOU:/zMbLPNgc1yGppAWG/QtMrmgcEyL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

unique28.5

C2

194.169.175.232:45451

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3800-0-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections