General

  • Target

    5768-598-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    b417e3eb9d9c3b7a8f060354f872cfa9

  • SHA1

    b6dec4ea60d8b08a77e4b6486f052be8d3bdacbd

  • SHA256

    93f455349ef085b21e743ffb9615795ed1b2b78214b841beab34b37837980cc6

  • SHA512

    12a10370265b89b2feee981e3f2245a061214003ca0df05c042c8ec831a248dbb3648caba0feca2013f7a7ed6aa4d3af4338f0e2b1f3b8ff810a5e7031592387

  • SSDEEP

    3072:d3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:deGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5768-598-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections